The Best Identity Verification Software Providers in 2026
What Is eKYC? A Quick Guide
FedRAMP Moderate Authorization: Why It Matters for Government Security
Key Lessons in Digital Identity Verification
What Is Decentralized Identity? Complete Guide & How To Prepare
What Is Digital Identity Management & How to Do It Right
FedRAMP Levels Explained & Compared (with Recommendations)
Key Lessons
Customer identity verification is critical for fraud prevention, compliance, and building trust in digital business.
Businesses can use layered methods (document verification, biome...
Customer Identity Verification: Overview & How to Do It Right
The 2025 Gartner® Magic Quadrant for Identity Verification report offers compelling insights and underscores a critical reality: identity verification sits at the core of cybersecurity. This annual...
1Kosmos Takes the Lead in Workforce Identity Verification
Hiring fraud is in the news. Google recently announced it's bringing back in-person job interviews, citing concerns about AI cheating during technical assessments. But there's a bigger issue lurkin...
Addressing AI-Enabled Hiring Fraud: The Remote Work Identity Challenge
As campuses gear up for another academic year, a quieter — but equally damaging — threat is draining university budgets: direct deposit fraud.
This isn’t ransomware that makes headlines by shutt...
The Silent Payroll Heist Hitting Universities
We’re proud to share that 1Kosmos has been recognized in the 2025 Gartner Magic Quadrant as a Challenger and for Identity Verification (IDV) — and we’ve earned the #1 Product Score for Workforce ba...
1Kosmos Ranked #1 in Workforce Product Score by Gartner
The Early Days: A Security Obsession
I've always been a security geek. Back before Information Security was a thing, I was figuring out ways to get into systems or keep people out. This goes all t...
From CISO to Startup Founder: The 1Kosmos Journey
Identity has become one of the most vulnerable parts of the digital world. Every week, we see headlines about new attacks: deepfakes tricking people into wiring money, social engineering scams bypa...
A New Approach to Identity
As CMO of 1Kosmos, I've had a front-row seat to watch this company evolve over the past five years. When we founded the company, the cybersecurity world was still obsessed with building bigger wall...
Why I’m More Bullish Than Ever on 1Kosmos
On the cusp of our series B funding, and as I look ahead to many big and bright developments for our company and for Identity and Access Management at large, I can’t help but look back at the visio...
How 1Kosmos Became the Reference Architecture for Modern Digital Identity
When a company's own founders and team members dig deeper into their pockets to invest more of their personal money, you know something big is happening. That's exactly what just occurred at 1Kosmo...
Founders and Team Members Are Investing Their Own Personal Capital in the Series B
Imagine I got a FaceTime call from my daughter right now, tears streaming down her face, desperately pleading for help. "Dada, I'm stuck somewhere. I need some money right now. I lost my wallet. Co...
AI Voice Cloning Scam: 15-Second Sample Can Steal Funds
At 1Kosmos, we believe that technology, when put to good use, has the power to transform lives and communities. That’s why, when Bell Canada, one of our valued customers and a longstanding champion...
Driving Change Together: 1Kosmos Sponsors Bell Canada’s Golf Tournament Supporting Kids Help Phone
Universities can't afford to treat cybersecurity as an afterthought. Here's how to close the gaps before the next breach.
On June 24, 2025, Columbia University joined the growing list of higher e...
Columbia University Hack Exposes the Identity Crisis in Higher Education
The Threat is Real and It's Here Now
On Friday, June 28, 2025, the FBI issued an urgent cybersecurity alert: the notorious Scattered Spider hacking collective has expanded its targeting to include...
Stopping Scattered Spider at the Identity Layer: Protecting Airlines from Identity-Based Cyberattacks
A Scattered Spider attack exploited systemic service desk flaws and weak privileged access controls. Here's how to shut the door for good.
When news broke that Marks & Spencer was compromise...
What the Marks & Spencer Breach Tells Us About the Next Era of Identity Attacks
Join 1Kosmos CSO Mike Engle and CMO Michael Cichon as they break down what it means to earn a perfect score in the iBeta Presentation Attack Detection (PAD) Level 2 certification, the gold standard...