Over the last year, we have listened to our customers, their feedback and their challenges. We have redesigned our product to be more usable, intuitive and flexible to meet the security landscape o...
Kim Cameron, the Father of Modern Identity, has greatly influenced the way we think about digital identity and privacy today. We were saddened to hear that Kim passed away on November 30th, 2021 af...
Rest in Peace, Kim Cameron
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos CTO, Rohan Pinto discuss digital wallets, flexible levels of identity assurance and how to secure your digital wallet.
Michael Cichon...
Digital Wallets
In this vlog, 1Kosmos CMO, Michael Cichon, and COO, Huzefa Olia, discuss the ISO/IEC 27001 Certification, why certifications are important and what certifications 1Kosmos is looking to obtain in th...
ISO/IEC 27001 Certification
Authentication as a service (AaaS) is becoming the extra level of security every company needs in the ever evolving business landscape of remote work.
What is Authentication As A Service?
Authent...
What Is Authentication as a Service (AaaS)?
With biometrics becoming the new secure password replacement, iris biometrics help verify and authenticate account access.
So, how do iris biometrics work? Iris biometrics work by scanning someo...
How Do Iris Biometrics Work?
In the physical world, proving identity is straightforward. First, you present your driver’s license or a physical identity card, which is compared to your likeness and verified. Then, you put your...
Who Is on the Other Side of Your Digital Connections?
It’s important for individuals to have more control and ownership over their digital identity and that can be done with decentralized identities.
What is a decentralized identity?
A decentralized...
What Is a Decentralized Identity on Blockchain?
Securing your digital identity on a blockchain is a smart move for your business if you find having a self-sovereign or decentralized identity important.
How does a blockchain verify identity? A...
Digital Identity Management on a Blockchain
Your digital identity, including potential work logins, can be exposed to hackers and sold to the highest bidder, so what can you do to protect it?
What Is a Digital Identity?
A digital identity ...
What Is a Digital Identity? [Importance of Digital IDs]
In this vlog, Jim Ducharme, Chief Operating Officer at Outseer, and Michael Engle, Chief Strategy Officer at 1Kosmos, discuss how 1Kosmos and Outseer are partnering to prevent account takeover (ATO...
Vlog: 1Kosmos and Outseer Strategic Partnership Extends Use Cases of Outseer Fraud Manager
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Things Missing In Your Current Passwordless Strategy
Trusting no one and verifying everyone is a security measure businesses may not think to take, but this measure becomes the main gatekeeper with zero-trust identity.
What is a zero-trust approac...
What Is Zero Trust Identity Security? [Access Management]
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos VP of Product Management, Javed Shah, discuss why it's important to onboard a third-party with identity-based authentication.
Michael:
...
How to Onboard a Third-Party with Identity-Based Authentication
With remote workers accessing documents in the cloud, authentication services have never become more important or relevant than they are right now.
What is the purpose of cloud authentication? T...
Cloud Authentication Services | Security for Enterprise IT
Identity Management (IAM) as a service will help protect your corporation from breaches and keep authentic users from accessing unauthorized information.
What is identity management as a service...
What Is Identity & Access Management as a Service?
Problems with Passwords
We all know that it is risky to authenticate employees, contractors, citizens and customers with passwords. The proof is in the seemingly endless list of credential based s...
Passwordless Authentication Has An Identity Crisis
An identity solution can be the difference between keeping your data secure and allowing hackers access to any digital information in your business.
So what is an identity solution? An identity ...
Identity Solutions: What To Look For
1Kosmos CMO, Michael Cichon, and Outseer CMO, Armen Najarian, discuss the 1Kosmos and RSA/Outseer partnership in their recent vlog.
Michael Cichon:
Welcome to the 1Kosmos video log. Armen Naj...
Vlog: 1Kosmos and RSA/Outseer Partnership with Armen Najarian and Michael Cichon
Today is another exciting day for the team here at 1Kosmos. Today, we are proud to announce our partnership with Outseer, the leader in payment authentication and monitoring cybersecurity and risk ...
1Kosmos and RSA/Outseer Partnership Protects Against Account Takeover (ATO) Attacks and Account Enrollment Fraud
What Is Multi-Factor Authentication?
Multi-factor authentication requires users to provide multiple credentials to access a system, which could include a username and password combination, a PIN, ...
What Is Multi-Factor Authentication (MFA) & How Does It Work?
Password Based Authentication Belongs in the Past
Password based authentication does not actually verify who is on the other end of the digital connection. This leads to anonymous users hiding beh...
Hyderabad Is Ready for Next-Gen MFA
Challenges In Digital Onboarding
With an increasingly digital world, identity fraud has become an even more pressing issue. To mitigate fraud, companies should embrace the same “Know Your Customer...