Introduction
Cybersecurity is no longer just about setting a strong password or having an encrypted connection. As digital threats have evolved, so too have the mechanisms to counteract them. Cont...
Introduction
Businesses today are at a crossroads of limitless prospects and invisible obstacles like fraud and money laundering as they navigate the exciting but treacherous seas of digital innov...
Know Your Business: The Practical Guide to KYB Checks
Symmetric encryption (or “private key” encryption) is the process of using a single key to both encrypt and decrypt data. It’s called “private key” because the use of a single encryption key necess...
What Is Symmetric Encryption, How Does It Work & Why Use It?
What Is Identity Orchestration?
Identity Orchestration is an Identity and Access Management (IAM) approach that automates managing and securing digital identities across diverse platforms, primari...
What Is Identity Orchestration? (Next Evolution of IAM?)
Today ones and zeros carry more weight than paper and ink; the ability to sniff out the genuine from the fraudulent has become an art form. Document verification, a seemingly mundane process, opera...
Unlocking Security with Document Verification: A Detailed Overview
If you want a telling glimpse at why Singapore ranks among the world's leaders in digital identity, look no further than this summer's British invasion. No, this former colony and small southeast A...
Digital Identity Spotlight: Singapore
Identity Threat Detection and Response (ITDR) is a collection of security tools and practices for monitoring, identifying, and responding to identity-related cybersecurity threats. ITDR solutions c...
What Is Identity Threat Detection & Response (ITDR)?
Michael Cichon:
Well, hello everybody. This is Michael Cichon, chief Marketing Officer at 1Kosmos. I'm here today with our VP of solutions, Vik Subramanian.
Vik, welcome to the vlog. It's good ...
Vlog: Making the Most of Your Windows Hello Investment
"Identity fabric" isn't a solution in and of itself, but rather represents a comprehensive and holistic approach to managing digital identities and security. This approach prioritizes flexible, sca...
What Is an Identity Fabric? (The Next Evolution of IAM?)
What Is Federated Identity?
Federated identity refers to linking a person's electronic identity and attributes stored across multiple identity management systems. These systems use common protocol...
What Is Federated Identity? How It Works & Why
Identity-related security is paramount in our modern threat landscape, touching on almost any form of vulnerability related to cybersecurity.
What Is Identity Lifecycle Management? Identity Life...
Identity Lifecycle Management (ILM) Explained
Join Michael Cichon, CMO of 1Kosmos, and Mike Engle, CSO, as they discuss the journey to passwordless multifactor authentication in their insightful vlog. Discover the nuances between the passwordl...
Vlog: Overcoming Resistance to Change on the Journey to Passwordless MFA
It shouldn't be a surprise that Belgium ranks among the vanguards of digital identity. The digital world as we know it may never have existed without this tiny northwestern European country of just...
Digital Identity Spotlight: Belgium
Pride month is a time when we celebrate the diversity of human identity and recognize the importance of embracing and honoring individuals for who they truly are. It is a reminder that everyone des...
A Celebration of Pride Month: Embracing Inclusive Identity Proofing and Authentication
Account takeover prevention actively reduces attack surfaces by which hackers can break into and use system accounts for malicious purposes.
What Is an Account Takeover Attack?
Account takeover (...
What Is Account Takeover Prevention? Preventing ATO Fraud
LinkedIn has joined the ranks of social media platforms offering ID verification badges designed to assure users that the person associated with a profile is in fact who they claim to be. Given org...
LinkedIn’s ID Verification – One Small Step in the Right Direction
Earlier this month, Verizon released its Data Breach Investigations Report (DBIR). In this 16th year of the report, Verizon highlighted their analysis of more than 953,894 incidents, of which 254,9...
Verizon Data Breach Investigations Report 2023
What Is Windows Credential Manager & How Does It Work?
Windows Credential Manager is Windows software that stores authentication credentials that are used to log in to websites or other computers ...
What Is Windows Credential Manager & How Does It Work?
What Are Login Credentials?
Login credentials are unique pieces of information that verify the identity of a user accessing a digital system.
How Do Login Credentials Work?
The functionality ...
What Are Login Credentials?
The Second Payment Services Directive (PSD2) is an EU law regulating electronic payment services within EU states and the European Economic Area (EEA).
As economic ties between the EU member st...
What Is PSD2 Compliance? How Does It Affect Your Business?
Detecting stolen and synthetic identities at the very front end of new account origination for every type of user can pay huge dividends but too often, tightening fraud controls can deliver an alie...
Trends in Identity Verification
In this vlog, our COO, Huzefa Olia, is joined by Kevin Shanley, Principal at Amazon Web Services Identity to discuss bringing verified identity and passwordless to the masses.
https://player.vim...
Bringing Verified Identity and Passwordless to the Masses
Many organizations are turning to passwordless authentication solutions to secure their systems and remove vulnerabilities from identity management.
Discover magic link authentication—a secure, ...
What Is Magic Link Authentication? Benefits & Challenges
Knowledge-Based Authentication (KBA), is a security measure used to verify a person's identity by asking them to provide specific information that only they should know.
How Does Knowledge-Based A...