Online identity verification solutions are fast and easy to verify someone's ID without requiring documents to be supplied in person.
What is online identity verification? Online identity verifi...
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The Advantages and Implications of Using Facial Recognition for Identity Verification Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
The Advantages and Implications of Using Facial Recognition for Identity Verification
Finding the best identity verification solution may be difficult depending on the features your business requires, but we make it easy with our top 5 guide.
The Top 5 Identity Verification Solutio...
Top 5 Identity Verification Solutions & Software
This week news broke about the strategic partnership between 1Kosmos and AuthenticID. This is an industry first that provides end-to-end strong identity proofing and authentication solutions for ci...
1Kosmos and AuthenticID Announce Strategic Partnership
Password spraying is a risk for all organizations; if one person's account gets hacked, the attacker could access vast amounts of sensitive information.
What is password spraying? Password spray...
What Is Password Spraying? [Brute-Force Attack Prevention]
Using MFA is a great starting point, but you'll want to know multi-factor authentication best practices to get the most out of your MFA solution.
What are the four factors of multi-factor authen...
Best Practices For Multi-Factor Authentication (MFA)
Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
FBI SIM Swapping Warning Issued
We hope to create the ultimate expression of a developer experience for passwordless authentication and identity proofing. The roles and responsibilities of developers have continued to expand in t...
1Kosmos Developer Experience
Ransomware has been increasing significantly. India is now amongst the top five targeted countries in the APAC region. 49% of organizations in India suffered multiple ransomware attacks in the past...
Ransomware in India
In my last blog post I talked about the fundamental shift from implied trust to verified identities at login. I could continue on this path and talk about how the security world revolves around ide...
The Role of Identity in Access Management and Web 3.0 Part 2
When 1Kosmos came into being, the founders focused on a mission to provide individuals with a secure digital identity that gives them control of their credentials and enables service providers to u...
The Role of Identity in Access Management and Web 3.0
In 2010, Forrester analyst John Kindervag coined the term “Zero Trust” in his research – emphasizing that all network traffic is untrusted and that any request to access any resource must be done s...
How Zero Trust Security Frameworks Work
Costs of multi-factor authentication can range drastically, but trying to figure out which provider is worth the money can be the hardest part.
Is multi-factor authentication free? While you may...
Cost of Multi-Factor Authentication: Is It Worth the Price?
Looking for a multi-factor authentication solution but can't decide which is best for your business? We've compiled the best MFA providers to help you choose.
Which is the best multi-factor auth...
Top Multi-Factor Authentication (MFA) Solutions for Business
KYC software can provide vital reassurance to many financial institutions that their customers aren't laundering money through their organization.
What is KYC software? Know your customer softwa...
What Is Know Your Customer (KYC) Software?
What Is Zero Trust?
Zero Trust is a proactive security approach that continuously verifies users, devices, and services before trusting them. This approach is commonly summarized as “never trust, ...
How Does Identity Impact the Six Pillars of Zero Trust?
IDaaS can also be defined as a software-as-a-service ID authentication solution, but is it similar to all the other ID solutions on the market?
What is IDaaS? Identity as a service is a cloud-ba...
What is Identity-As-A-Service (IDAAS)?
If you're looking for the best SSO solution, you'll want to keep reading. We found the top SSO solutions for businesses to help your company with user experience and security.
What is an SSO sol...
Top 7 SSO Software Solutions For Business
On December 9, 2021 a flaw was publicly disclosed in Apache's Log4j 2, a logging utility used by Java applications. Named Log4Shell (CVE-2021-44228), the vulnerability can be used by attackers to t...
What You Need to Know about Log4Shell (CVE-2021-44228)
Comparing federated identity management and SSO can be tricky if you don't fully understand federation or identity and access management. We're walking through both to help you compare.
What is ...
Federated Identity Management vs. SSO: Which is Better?
Using distributed identity management for your business should be a no-brainer, especially if you're worried about security for your employees' logins.
But what is blockchain authentication? Blo...
Blockchain Authentication: Security for Digital Identities
Looking for an identity management service solution? We've found the best in the industry to help you secure your network and your employee's identity.
What is an identity management service? I...
Top Identity Management (IAM) Service Solutions
Over the last year, we have listened to our customers, their feedback and their challenges. We have redesigned our product to be more usable, intuitive and flexible to meet the security landscape o...