Identity providers are a seamless way to authenticate your users and also maintain security on your enterprise network.
What is an identity provider? An identity provider is a service that verif...
In this video blog, our CTO, Rohan Pinto, joins our CMO, Michael Cichon, to discuss why architecture matters for security and privacy in citizen ID.
https://player.vimeo.com/video/706244577
W...
Why Architecture Matters for Security and Privacy in Citizen ID
Self-sovereign identities are the future of digital identities. Putting the control back into the hands of the users allows for greater security everywhere.
What is self-sovereign identity? Self...
What Is Self-Sovereign Identity? (The Future of ID?)
Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?
What is a digital identity? A digital i...
What Is Distributed Identity? How Decentralized ID Works
When news of the Lapsus$ breach at Okta surfaced a few days ago it initially seemed of little consequence. The explanation that a 3rd party contractor with limited access had been compromised seeme...
The Lapsus$ Breach at Okta and Why Single Sign On Needs an Identity Layer
In June 2021, the European Commission proposed an update to its pan-European digital identity framework, which will give every European a set of digital identity credentials that will be recognized...
What Is eIDAS 2.0?
Online identity verification solutions are fast and easy to verify someone's ID without requiring documents to be supplied in person.
What is online identity verification? Online identity verifi...
How Online Identity Verification Works
In my last blog post, I started discussing the implications of identity verification and facial recognition where organizations didn’t consider components of a zero trust architecture. Specifically...
The Advantages and Implications of Using Facial Recognition for Identity Verification Pt 2
The move to biometric authentication started as far back as 2004 when IBM introduced fingerprint readers. Biometrics went mainstream when Apple released TouchID on the iPhone in 2013.
Since then...
The Advantages and Implications of Using Facial Recognition for Identity Verification
Finding the best identity verification solution may be difficult depending on the features your business requires, but we make it easy with our top 5 guide.
The Top 5 Identity Verification Solutio...
Top 5 Identity Verification Solutions & Software
Password spraying is a risk for all organizations; if one person's account gets hacked, the attacker could access vast amounts of sensitive information.
What is password spraying? Password spray...
What Is Password Spraying? [Brute-Force Attack Prevention]
Yesterday (February 9, 2022) the FBI issued a warning to inform the American public and mobile carriers about the increasing threat of SIM (Subscriber Identity Module) swapping. In 2020, criminals ...
FBI SIM Swapping Warning Issued
In my last blog post I talked about the fundamental shift from implied trust to verified identities at login. I could continue on this path and talk about how the security world revolves around ide...
The Role of Identity in Access Management and Web 3.0 Part 2
When 1Kosmos came into being, the founders focused on a mission to provide individuals with a secure digital identity that gives them control of their credentials and enables service providers to u...
The Role of Identity in Access Management and Web 3.0
IDaaS can also be defined as a software-as-a-service ID authentication solution, but is it similar to all the other ID solutions on the market?
What is IDaaS? Identity as a service is a cloud-ba...
What is Identity-As-A-Service (IDAAS)?
On December 9, 2021 a flaw was publicly disclosed in Apache's Log4j 2, a logging utility used by Java applications. Named Log4Shell (CVE-2021-44228), the vulnerability can be used by attackers to t...
What You Need to Know about Log4Shell (CVE-2021-44228)
Comparing federated identity management and SSO can be tricky if you don't fully understand federation or identity and access management. We're walking through both to help you compare.
What is ...
Federated Identity Management vs. SSO: Which is Better?
Looking for an identity management service solution? We've found the best in the industry to help you secure your network and your employee's identity.
What is an identity management service? I...
Top Identity Management (IAM) Service Solutions
Over the last year, we have listened to our customers, their feedback and their challenges. We have redesigned our product to be more usable, intuitive and flexible to meet the security landscape o...
Introducing 1Kosmos’ New Admin Experience
Kim Cameron, the Father of Modern Identity, has greatly influenced the way we think about digital identity and privacy today. We were saddened to hear that Kim passed away on November 30th, 2021 af...
Rest in Peace, Kim Cameron
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos CTO, Rohan Pinto discuss digital wallets, flexible levels of identity assurance and how to secure your digital wallet.
Michael Cichon...
Digital Wallets
In this vlog, 1Kosmos CMO, Michael Cichon, and COO, Huzefa Olia, discuss the ISO/IEC 27001 Certification, why certifications are important and what certifications 1Kosmos is looking to obtain in th...
ISO/IEC 27001 Certification
It’s important for individuals to have more control and ownership over their digital identity and that can be done with decentralized identities.
What is a decentralized identity?
A decentralized...
What Is a Decentralized Identity on Blockchain?
Securing your digital identity on a blockchain is a smart move for your business if you find having a self-sovereign or decentralized identity important.
How does a blockchain verify identity? A...