In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
How to Reform the Delivery of Government Services via Internet Pt 1
Identity providers are a seamless way to authenticate your users and also maintain security on your enterprise network.
What is an identity provider? An identity provider is a service that verif...
What Is an Identity Provider? Benefits of IdPs
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Key Considerations in Your Passwordless Journey
When great minds and visionary leaders come together, good things can happen. Better yet, when they come together with a shared interest to solve a challenge and bring along specialized teams with ...
AuthenticID and 1Kosmos: A Shared Vision to Unify Identity Proofing and Authentication
Passwordless authentication is becoming a hot topic in the identity verification field as capabilities are becoming more and more sophisticated. To eliminate passwords the market has shifted to aut...
Why Device Level Biometrics Do Not Equate to Identity
In this video blog, our CTO, Rohan Pinto, joins our CMO, Michael Cichon, to discuss why architecture matters for security and privacy in citizen ID.
https://player.vimeo.com/video/706244577
W...
Why Architecture Matters for Security and Privacy in Citizen ID
Strong authentication can be the difference between hackers easily slipping into your network and stealing your data or being able to block them from the start.
What is strong authentication? St...