OIDC vs. SAML: What's the Difference?
Security Assertion Markup Language (SAML) vs. OpenID Connect (OIDC): It can be challenging to choose between the two and decide which is best for business.
...
In this vlog, Mike Engle and Michael Cichon discuss how government agencies can securely deliver digital services to their constituents.
https://player.vimeo.com/video/761643613
&nb...
How to Preserve Privacy While Delivering Digital Government Services
RBAC, ABAC, and PBAC are all access controls that can help keep certain information or systems restricted to those based on user, environment, role and more.
What do RBAC, ABAC and PBAC stand fo...
RBAC vs ABAC vs PBAC: Access Control Uses & Definitions
Contractor Fraud and the Rise of Remote Work
Many organizations require the use of contractors, known as third parties. Managing these non-employees through the HR system, the authoritative identi...
Stopping the Latest Scam in Remote Contractor Onboarding
Passwords are becoming a thing of the past with biometrics taking over. But what does this mean for security, and what types of biometrics can be used?
What are examples of biometrics? Some exam...
What Is Biometrics? Different Types of Biometrics Explained
What is passport scanning? Is there a convenient way to securely scan passports remotely? Our CSO, Mike Engle, joins our CMO, Michael Cichon, to answer these questions and more in their recent vlog...
Is There a Secure Way to Scan Passports Remotely?
As an information security standard, ISO 27001 can be beneficial to understand and comply with, but what exactly is ISO 27001?
What does ISO 27001 mean? ISO 27001 is a regulation for Information...
What is ISO 27001: Information Security Standard?
What are behavioral biometrics? Behavioral biometrics analyzes a user's physical movements and patterns while partaking in certain activities like typing, walking or even how much pressure is used ...
What Is Behavioral Biometric Authentication?
Looking to implement zero trust in your organization but don't know where to start? Keep reading to find the best way to get a zero-trust model up and running.
What is zero trust? Zero trust is ...
How to Implement a Zero Trust Security Model
What is fingerprint verification? Fingerprint verification uses a fingerprint scan to identify and verify that a user is who they say they are. Fingerprint authentication is the most popular way to...
Fingerprint Verification: How Does It Work?
As the teenager taking credit for last week's Uber hack so ably demonstrated, threat actors have found an unlikely accomplice in multifactor authentication. But how did cyberattackers manipulate MF...
Uber Hack: MFA Can’t Fix the Problem Until We Fix MFA
Here at 1Kosmos, It’s been an action-packed September full of events, analyst mentions, awards and more. One of these exciting events was an Innovation Festival in the Philippines hosted by our cus...
Reflections from UnionDigital Innovation Festival
Why Implement Biometric MFA?
We are all aware of the risks associated with password-based authentication. The proof is in the seemingly endless list of password-based breaches that we see in the n...
Biometric Based MFA for Zero Trust
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
1Kosmos had the pleasure of attending the Gartner IAM Summit 2022 in Las Vegas. It was our first time exhibiting and sponsoring the event. I have to say it was great to see long time friends, forme...
Gartner IAM Thoughts and Observations
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cycle...
1Kosmos Mentioned in 5 Recent Gartner® Hype Cycle™ Reports
Synthetic identities can easily be mistaken for real identities and can wreak havoc on companies that fall victim. So how can you differentiate between the two?
What is synthetic identity theft?...
What Is Synthetic Identity Theft? New Path For Fraud?
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos COO, Huzefa Olia, discuss best practices for fixing multifactor authentication.
https://player.vimeo.com/video/745520635
Michael Cicho...
Vlog: MFA Tried to Fix Passwords but How do we Fix MFA?
CEO fraud attacks can destroy a company's financial and reputational future but are there any ways to protect against these attacks?
What is CEO fraud? CEO fraud, also called executive or whale ...
What is CEO Fraud? – Attacks & How to Prevent Them
Access control is a security measure that can prevent unauthorized access to sensitive information. But how can mandatory access control help with security?
What is mandatory access control? Man...
What Is Mandatory Access Control (MAC)?
Strong Customer Authentication works to protect European users when accessing sensitive financial information, but your company may also need it for compliance.
What is strong customer authentic...
What is Strong Customer Authentication (SCA) & PSD2?
In this vlog, our Chief Operating Officer, Huzefa Olia, joins our Chief Marketing Officer, Michael Cichon, to discuss why Okta needs an identity layer.
https://player.vimeo.com/video/740777974
...
Vlog: Why Okta Needs an Identity Layer
Driver’s licenses were one of the top three most breached data attributes in 2021, according to the Identity Theft Resource Center (ITRC). To make matters worse, many driver’s licenses are counterf...