In this vlog, Mike Engle and Michael Cichon discuss how government agencies can securely deliver digital services to their constituents.
https://player.vimeo.com/video/761643613
&nb...
RBAC, ABAC, and PBAC are all access controls that can help keep certain information or systems restricted to those based on user, environment, role and more.
What do RBAC, ABAC and PBAC stand fo...
RBAC vs ABAC vs PBAC: Access Control Uses & Definitions
Contractor Fraud and the Rise of Remote Work
Many organizations require the use of contractors, known as third parties. Managing these non-employees through the HR system, the authoritative identi...
Stopping the Latest Scam in Remote Contractor Onboarding
Here at 1Kosmos, It’s been an action-packed September full of events, analyst mentions, awards and more. One of these exciting events was an Innovation Festival in the Philippines hosted by our cus...
Reflections from UnionDigital Innovation Festival
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cyc...
1Kosmos Mentioned in 5 Recent Gartner® Hype Cycle™ Reports
Synthetic identities can easily be mistaken for real identities and can wreak havoc on companies that fall victim. So how can you differentiate between the two?
What is synthetic identity theft?...
What Is Synthetic Identity Theft? New Path For Fraud?
Access control is a security measure that can prevent unauthorized access to sensitive information. But how can mandatory access control help with security?
What is mandatory access control? Man...
What Is Mandatory Access Control (MAC)?
In this vlog, our Chief Operating Officer, Huzefa Olia, joins our Chief Marketing Officer, Michael Cichon, to discuss why Okta needs an identity layer.
https://player.vimeo.com/video/740777974
...
Vlog: Why Okta Needs an Identity Layer
Driver’s licenses were one of the top three most breached data attributes in 2021, according to the Identity Theft Resource Center (ITRC). To make matters worse, many driver’s licenses are counterf...
Achieve a Higher Level of Identity Assurance with BlockID’s AAMVA Integration
CIP and KYC are vital procedures and guidelines to help keep customer data secure while also verifying a customer's identity.
What is KYC CIP? Know your customer and customer identification proc...
CIP vs. KYC: What’s the Difference?
Remote onboarding is becoming the new normal, and if your company doesn't adapt to the new work environment, your company will be left behind.
What is Remote Onboarding?
Remote onboarding is the ...
Remote Onboarding for the Modern Workforce
Hackers attack passwords systematically, and it's only a matter of time before they crack your login. What best practices can help secure your account?
What are best practices for creating a pas...
Top 6 Password Security Best Practices
NIST compliance provides security standards for businesses handling federal information, but how do you meet these compliance regulations?
What is NIST compliance? NIST compliance is the Nationa...
What Is the NIST Compliance Framework & CMMC?
SOC 2 compliance should be at the top of the list for all technology services, software-as-a-service organizations, and service providers managing or storing customer data in the cloud.
What is ...
What Is SOC 2 Compliance & Certification?
The road to zero trust can be bumpy for nearly any organization. While CISOs need to make data and services accessible to their users, they also need to protect the same data and services in order ...
How to Defeat a Zero Trust Architecture
Business email compromise is one of the many types of phishing attacks targeting both large and small corporations for financial gain.
What is a BEC attack? A BEC attack is a type of phishing sc...
BEC Attacks: What Is Business Email Compromise?
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
How to Reform the Delivery of Government Services via Internet Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
How to Reform the Delivery of Government Services via Internet Pt 1
Identity providers are a seamless way to authenticate your users and also maintain security on your enterprise network.
What is an identity provider? An identity provider is a service that verif...
What Is an Identity Provider? Benefits of IdPs
In this video blog, our CTO, Rohan Pinto, joins our CMO, Michael Cichon, to discuss why architecture matters for security and privacy in citizen ID.
https://player.vimeo.com/video/706244577
W...
Why Architecture Matters for Security and Privacy in Citizen ID
Self-sovereign identities are the future of digital identities. Putting the control back into the hands of the users allows for greater security everywhere.
What is self-sovereign identity? Self...
What Is Self-Sovereign Identity? (The Future of ID?)
Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?
What is a digital identity? A digital i...