Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
In my last blog post I talked about the fundamental shift from implied trust to verified identities at login. I could continue on this path and talk about how the security world revolves around ide...
The Role of Identity in Access Management and Web 3.0 Part 2
When 1Kosmos came into being, the founders focused on a mission to provide individuals with a secure digital identity that gives them control of their credentials and enables service providers to u...
The Role of Identity in Access Management and Web 3.0
IDaaS can also be defined as a software-as-a-service ID authentication solution, but is it similar to all the other ID solutions on the market?
What is IDaaS? Identity as a service is a cloud-ba...
What is Identity-As-A-Service (IDAAS)?
On December 9, 2021 a flaw was publicly disclosed in Apache's Log4j 2, a logging utility used by Java applications. Named Log4Shell (CVE-2021-44228), the vulnerability can be used by attackers to t...
What You Need to Know about Log4Shell (CVE-2021-44228)
Comparing federated identity management and SSO can be tricky if you don't fully understand federation or identity and access management. We're walking through both to help you compare.
What is ...
Federated Identity Management vs. SSO: Which is Better?
Looking for an identity management service solution? We've found the best in the industry to help you secure your network and your employee's identity.
What is an identity management service? I...
Top Identity Management (IAM) Service Solutions
Over the last year, we have listened to our customers, their feedback and their challenges. We have redesigned our product to be more usable, intuitive and flexible to meet the security landscape o...