Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
In my last blog post I talked about the fundamental shift from implied trust to verified identities at login. I could continue on this path and talk about how the security world revolves around ide...
The Role of Identity in Access Management and Web 3.0 Part 2
When 1Kosmos came into being, the founders focused on a mission to provide individuals with a secure digital identity that gives them control of their credentials and enables service providers to u...
The Role of Identity in Access Management and Web 3.0
IDaaS can also be defined as a software-as-a-service ID authentication solution, but is it similar to all the other ID solutions on the market?
What is IDaaS? Identity as a service is a cloud-ba...
What is Identity-As-A-Service (IDAAS)?
On December 9, 2021 a flaw was publicly disclosed in Apache's Log4j 2, a logging utility used by Java applications. Named Log4Shell (CVE-2021-44228), the vulnerability can be used by attackers to t...
What You Need to Know about Log4Shell (CVE-2021-44228)
Comparing federated identity management and SSO can be tricky if you don't fully understand federation or identity and access management. We're walking through both to help you compare.
What is ...
Federated Identity Management vs. SSO: Which is Better?
Looking for an identity management service solution? We've found the best in the industry to help you secure your network and your employee's identity.
What is an identity management service? I...
Top Identity Management (IAM) Service Solutions
Over the last year, we have listened to our customers, their feedback and their challenges. We have redesigned our product to be more usable, intuitive and flexible to meet the security landscape o...
Introducing 1Kosmos’ New Admin Experience
Kim Cameron, the Father of Modern Identity, has greatly influenced the way we think about digital identity and privacy today. We were saddened to hear that Kim passed away on November 30th, 2021 af...
Rest in Peace, Kim Cameron
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos CTO, Rohan Pinto discuss digital wallets, flexible levels of identity assurance and how to secure your digital wallet.
Michael Cichon...
Digital Wallets
In this vlog, 1Kosmos CMO, Michael Cichon, and COO, Huzefa Olia, discuss the ISO/IEC 27001 Certification, why certifications are important and what certifications 1Kosmos is looking to obtain in th...
ISO/IEC 27001 Certification
It’s important for individuals to have more control and ownership over their digital identity and that can be done with decentralized identities.
What is a decentralized identity?
A decentralize...
What Is a Decentralized Identity on Blockchain?
Securing your digital identity on a blockchain is a smart move for your business if you find having a self-sovereign or decentralized identity important.
How does a blockchain verify identity? A...
Digital Identity Management on a Blockchain
Your digital identity, including potential work logins, can be exposed to hackers and sold to the highest bidder, so what can you do to protect it?
What Is a Digital Identity?
A digital identity ...
What Is a Digital Identity? [Importance of Digital IDs]
Trusting no one and verifying everyone is a security measure businesses may not think to take, but this measure becomes the main gatekeeper with zero-trust identity.
What is a zero-trust approac...
What Is Zero Trust Identity Security? [Access Management]
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
Identity Management (IAM) as a service will help protect your corporation from breaches and keep authentic users from accessing unauthorized information.
What is identity management as a service...
What Is Identity & Access Management as a Service?
An identity solution can be the difference between keeping your data secure and allowing hackers access to any digital information in your business.
So what is an identity solution? An identity ...
Identity Solutions: What To Look For
Keeping track of passwords and usernames can become a headache for clients, but with Federated Identity Management, those issues become obsolete.
What is Federated Identity Management?
Federated ...
How Federated Identity Management (FIM) Works
Identity proofing solutions add a level of security to your enterprise and create a better user experience for your employees and customers.
What is identity proofing? Identity proofing is a pro...
What Is Identity Proofing & Verification?
In the first blog of this series, we positioned decentralization of identity as a construct that allowed for preservation of a user’s privacy in stark contrast to the invasion and exponential destr...
Decentralized Identity Management and User Data Sharing
Customer identity and access management is the solution your business needs if you’re currently struggling with controlling customer user IDs.
What is CIAM? CIAM is an access management solution...
What is Customer Identity and Access Management (CIAM)?
In this vlog, 1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss the 20th anniversary of 9/11 and how the attacks changed our security landscape.
Michael Cichon:
Welcome, Mike Engle, Chi...
Vlog: 9/11 Commemoration
How can you ensure your employees are only accessing the data they are allowed to? Identity and access management helps to put those checkpoints in place.
Why is identity management important? I...