When news of the Lapsus$ breach at Okta surfaced a few days ago it initially seemed of little consequence. The explanation that a 3rd party contractor with limited access had been compromised seeme...
In June 2021, the European Commission proposed an update to its pan-European digital identity framework, which will give every European a set of digital identity credentials that will be recognized...
What Is eIDAS 2.0?
Online identity verification solutions are fast and easy to verify someone's ID without requiring documents to be supplied in person.
What is online identity verification? Online identity verifi...
How Online Identity Verification Works
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The Advantages and Implications of Using Facial Recognition for Identity Verification Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
The Advantages and Implications of Using Facial Recognition for Identity Verification
Finding the best identity verification solution may be difficult depending on the features your business requires, but we make it easy with our top 5 guide.
The Top 5 Identity Verification Solutio...
Top 5 Identity Verification Solutions & Software
Password spraying is a risk for all organizations; if one person's account gets hacked, the attacker could access vast amounts of sensitive information.
What is password spraying? Password spray...
What Is Password Spraying? [Brute-Force Attack Prevention]
Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
FBI SIM Swapping Warning Issued
In my last blog post I talked about the fundamental shift from implied trust to verified identities at login. I could continue on this path and talk about how the security world revolves around ide...
The Role of Identity in Access Management and Web 3.0 Part 2
When 1Kosmos came into being, the founders focused on a mission to provide individuals with a secure digital identity that gives them control of their credentials and enables service providers to u...
The Role of Identity in Access Management and Web 3.0
IDaaS can also be defined as a software-as-a-service ID authentication solution, but is it similar to all the other ID solutions on the market?
What is IDaaS? Identity as a service is a cloud-ba...
What is Identity-As-A-Service (IDAAS)?
On December 9, 2021 a flaw was publicly disclosed in Apache's Log4j 2, a logging utility used by Java applications. Named Log4Shell (CVE-2021-44228), the vulnerability can be used by attackers to t...
What You Need to Know about Log4Shell (CVE-2021-44228)
Comparing federated identity management and SSO can be tricky if you don't fully understand federation or identity and access management. We're walking through both to help you compare.
What is ...
Federated Identity Management vs. SSO: Which is Better?
Looking for an identity management service solution? We've found the best in the industry to help you secure your network and your employee's identity.
What is an identity management service? I...
Top Identity Management (IAM) Service Solutions
Over the last year, we have listened to our customers, their feedback and their challenges. We have redesigned our product to be more usable, intuitive and flexible to meet the security landscape o...
Introducing 1Kosmos’ New Admin Experience
Kim Cameron, the Father of Modern Identity, has greatly influenced the way we think about digital identity and privacy today. We were saddened to hear that Kim passed away on November 30th, 2021 af...
Rest in Peace, Kim Cameron
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos CTO, Rohan Pinto discuss digital wallets, flexible levels of identity assurance and how to secure your digital wallet.
Michael Cichon...
Digital Wallets
In this vlog, 1Kosmos CMO, Michael Cichon, and COO, Huzefa Olia, discuss the ISO/IEC 27001 Certification, why certifications are important and what certifications 1Kosmos is looking to obtain in th...
ISO/IEC 27001 Certification
It’s important for individuals to have more control and ownership over their digital identity and that can be done with decentralized identities.
What is a decentralized identity?
A decentralized...
What Is a Decentralized Identity on Blockchain?
Securing your digital identity on a blockchain is a smart move for your business if you find having a self-sovereign or decentralized identity important.
How does a blockchain verify identity? A...
Digital Identity Management on a Blockchain
Your digital identity, including potential work logins, can be exposed to hackers and sold to the highest bidder, so what can you do to protect it?
What Is a Digital Identity?
A digital identity ...
What Is a Digital Identity? [Importance of Digital IDs]
Trusting no one and verifying everyone is a security measure businesses may not think to take, but this measure becomes the main gatekeeper with zero-trust identity.
What is a zero-trust approac...
What Is Zero Trust Identity Security? [Access Management]
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
Identity Management (IAM) as a service will help protect your corporation from breaches and keep authentic users from accessing unauthorized information.
What is identity management as a service...