With credential stuffing attacks on 23andM and Okta just the latest breaches to make headlines in recent weeks, the push for biometrics-based authentication is gaining momentum for Identity and Acc...
Dive into the dynamic world of digital identity with Rob MacDonald, VP of Product Marketing, and Huzefa Olia, Co-founder and COO, in our latest vlog! Join this insightful conversation as they unpac...
Vlog: What the UK Government Digital Identity and Attributes Trust Framework Certification Means for 1Kosmos
PCI DSS version 4.0 is the latest iteration of the Payment Card Industry Data Security Standard, released on March 31, 2022, and is currently in effect. The previous version, PCI DSS version 3.2.1,...
Are You Ready for PCI DSS Version 4.0?
Demands by residents for contactless services have accelerated the need for digital government services, but rampant identity fraud is impeding digital transformation and costing taxpayers millions...
Securing Digital Government Services with Credential Service Providers
For far too many organizations, Identity and Access Management (IAM) has become a study in locking the storm window while leaving the front door wide open. From MGM to Facebook to T-Mobile and beyo...
What a Difference Identity Makes: Why IAM Keeps Falling Short–and How to Fix It
Identity Governance is a beacon for organizations aiming to maintain regulatory compliance, safeguard operations and boost efficiency. Let's demystify this term: Identity Governance, tailored for o...
Identity Governance for Organizations: A Guide to Implementation and Best Practices
A Distributed Ledger stands at the forefront of modern database technology, a shared database spread across many sites, countries, or institutions. This innovative approach to data management recor...
Distributed Ledger: A Comprehensive Insight for Organizations
A new method for controlling and confirming digital identities is emerging: distributed digital identity (DDI). By removing the need for a single authoritative source, DDI empowers users to take ch...
Distributed Digital Identity: A Transformative Guide for Organizations
Whether it's Henry the Navigator leading The Age of Discovery or Cristiano Ronaldo nailing a mid-air pirouette on the football field, Portugal has long been home to game-changing innovation—and dig...
Digital Identity Spotlight: Portugal
Join Rob MacDonald, VP of Product Marketing, and Mike Engle, Co-founder of 1Kosmos, as they discuss the recent cyber attack on MGM and explore the world of vishing (voice phishing) in this informat...
Identity Based Authentication: The Key to Preventing Future MGM-Style Attacks
In the ever-evolving landscape of cybersecurity, it's crucial to stay up to date with the latest innovations and technologies designed to enhance online security. One such innovation that has gaine...
Demystifying Passkeys: A Future of Passwordless Authentication
Introduction
Traditional password-based authentication techniques are vulnerable to online attacks. Fortunately, a ground-breaking remedy called an identity-based passwordless authentication syste...
Defending Your Online Presence: Identity-Based Passwordless Authentication
Introduction
Have you ever considered how identity verification is handled? Do not look other than eKYC. The complexity of eKYC will be unlocked with this article. Join us as we dive deep into thi...
Understanding eKYC: An In-Depth Overview
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by the VP of Solutions, Vikram Subramanian to discuss inserting identity into your SSO implementation.
Robert Mac...
Inserting Identity into Your SSO Implementation
With the rise of two-factor authentication and age verification, we're arming businesses with advanced tools to shield privacy and build confidence. This article will explore the evolution of custo...
From Traditional to Revolutionary: The Evolution of Customer Verification Methods
Introduction
The digital transformation sweeping across the business landscape has made efficiency and security two sides of the same coin. User provisioning stands at this crossroads, orchestrati...
User Provisioning: The Key to Unlocking Seamless Workflow
Introduction
Money laundering, the process of making illicitly gained money appear legitimate, has far-reaching implications for the global economy. It can serve as a lifeline for criminal organiz...
A Comprehensive Insight into Anti-Money Laundering Compliance
Introduction
Cybersecurity is no longer just about setting a strong password or having an encrypted connection. As digital threats have evolved, so too have the mechanisms to counteract them. Cont...
Continuous Authentication: A Dynamic Approach to User Verification
Introduction
Businesses today are at a crossroads of limitless prospects and invisible obstacles like fraud and money laundering as they navigate the exciting but treacherous seas of digital innov...
Know Your Business: The Practical Guide to KYB Checks
Symmetric encryption (or “private key” encryption) is the process of using a single key to both encrypt and decrypt data. It’s called “private key” because the use of a single encryption key necess...
What Is Symmetric Encryption, How Does It Work & Why Use It?
What Is Identity Orchestration?
Identity Orchestration is an Identity and Access Management (IAM) approach that automates managing and securing digital identities across diverse platforms, primari...
What Is Identity Orchestration? (Next Evolution of IAM?)
Today ones and zeros carry more weight than paper and ink; the ability to sniff out the genuine from the fraudulent has become an art form. Document verification, a seemingly mundane process, opera...
Unlocking Security with Document Verification: A Detailed Overview
If you want a telling glimpse at why Singapore ranks among the world's leaders in digital identity, look no further than this summer's British invasion. No, this former colony and small southeast A...
Digital Identity Spotlight: Singapore
Identity Threat Detection and Response (ITDR) is a collection of security tools and practices for monitoring, identifying, and responding to identity-related cybersecurity threats. ITDR solutions c...