User account access is a foundational form of cybersecurity, addressing both internal and external threats.
How does Privileged Access Management (PAM) aid security? PAM centralizes privileged d...
In this vlog, 1Kosmos CSO, Mike Engle, is joined by CodeCluster CEO, Mike Vitez, to discuss how 1Kosmos, Arculus, and CodeCluster partner to reduce fraud.
https://player.vimeo.com/video/...
1Kosmos, CodeCluster, and Arculus Partner to Reduce Fraud
Hackers attack computer systems to steal information. Some of the most important types of information they can steal are access credentials like usernames/passwords or PINs.
Why is credential ac...
What Is Credential Access?
While phishing and network attacks are still the most common hacks around, old-fashioned system hacking is still a threat to enterprises.
What is credential dumping? It is when a hacker uses exp...
What Is Credential Dumping & How To Prevent It?
Cyber threats are becoming increasingly sophisticated with the number of bad actors involved increasing at an alarming rate. New and sophisticated techniques are being used that have evolved over t...
Digital Transformation of Personnel Onboarding
It's 2023—do you know what your identity is doing? As the adoption of digital channels continues to be matched by corresponding levels of fraud, the ability to achieve digital identity verification...
6 Digital Identity Predictions for 2023
With the EU becoming a major economic player, its rules and regulations are being felt around the business world.
What is GDPR? GDPR is a set of regulations specific to businesses in the EU gove...
7 Core Principles for GDPR Data Protection
Online, always-on finance and banking have led to significant security challenges for institutions trying to thwart international terrorism, identity theft, and fraud.
What are KYC regulations? ...
What Is KYC (Know Your Customer) For Banking?
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos CSO, Mike Engle, to discuss how digital identity can modernize healthcare. If you are interested in learning more about this topic, p...
The Role of Digital Identity in Modernizing Health Care
The Importance of Digital Identity and Wallets in Healthcare
Traditional processes in today's healthcare landscape have left sensitive personal information scattered across a lifetime of providers...
The Importance of Digital Identity in Healthcare
In this vlog, 1Kosmos' Product Manager, Sheetal Elangovan, joins 1Kosmos' CMO, Michael Cichon, to discuss how employee onboarding can be fixed with document verification and identity based authenti...
How to Fix Onboarding With Document Verification and Identity Based Authentication
A SIM swapping scam can not only take over your phone but can also become detrimental to your financial health as scammers can steal bank logins or data.
What does SIM swapping do? SIM swapping ...
What Is SIM Swapping? How To Protect Against This Scam
In this vlog, our CMO, Michael Cichon, is joined by our CSO, Mike Engle, to discuss how digital identity verification can be used to combat synthetic identity fraud and account takeover. If you are...
Combatting Synthetic Identity Fraud and Account Takeover With Digital Identity Verification
As someone who's spent a career leading financial operations for successful cybersecurity startups such as Attivo Networks and Cloudmark, I knew it would be hard to resist an invitation from 1Kosmo...
3 Reasons I Joined 1Kosmos: Jilbert Washten
As we close the celebration of the 19th annual Cybersecurity Awareness Month this October, it’s an ideal time to focus on the need to improve all cybersecurity measures by eliminating passwords and...
Celebrating the 19th Annual Cybersecurity Awareness Month
While NIST's Cybersecurity Framework is probably the most well-known, there are other cybersecurity frameworks your organization should be aware of.
What is a cybersecurity framework? A cybersec...
Cybersecurity Framework & NIST: What You Need to Know
The principle of least privilege is meant to limit user access to protect the organization's information from being hacked or leaked.
What is the principle of least privilege?
The Principle o...
What Is the Principle of Least Privilege (POLP)?
In this vlog, Mike Engle and Michael Cichon discuss how government agencies can securely deliver digital services to their constituents.
https://player.vimeo.com/video/761643613
&nb...
How to Preserve Privacy While Delivering Digital Government Services
RBAC, ABAC, and PBAC are all access controls that can help keep certain information or systems restricted to those based on user, environment, role and more.
What do RBAC, ABAC and PBAC stand fo...
RBAC vs ABAC vs PBAC: Access Control Uses & Definitions
Contractor Fraud and the Rise of Remote Work
Many organizations require the use of contractors, known as third parties. Managing these non-employees through the HR system, the authoritative identi...
Stopping the Latest Scam in Remote Contractor Onboarding
Here at 1Kosmos, It’s been an action-packed September full of events, analyst mentions, awards and more. One of these exciting events was an Innovation Festival in the Philippines hosted by our cus...
Reflections from UnionDigital Innovation Festival
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cyc...