Trusting no one and verifying everyone is a security measure businesses may not think to take, but this measure becomes the main gatekeeper with zero-trust identity.
What is a zero-trust approac...
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
Identity Management (IAM) as a service will help protect your corporation from breaches and keep authentic users from accessing unauthorized information.
What is identity management as a service...
What Is Identity & Access Management as a Service?
An identity solution can be the difference between keeping your data secure and allowing hackers access to any digital information in your business.
So what is an identity solution? An identity ...
Identity Solutions: What To Look For
Identity proofing solutions add a level of security to your enterprise and create a better user experience for your employees and customers.
What is identity proofing? Identity proofing is a pro...
What Is Identity Proofing & Verification?
In the first blog of this series, we positioned decentralization of identity as a construct that allowed for preservation of a user’s privacy in stark contrast to the invasion and exponential destr...
Decentralized Identity Management and User Data Sharing
Customer identity and access management is the solution your business needs if you’re currently struggling with controlling customer user IDs.
What is CIAM? CIAM is an access management solution...
What is Customer Identity and Access Management (CIAM)?
In this vlog, 1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss the 20th anniversary of 9/11 and how the attacks changed our security landscape.
Michael Cichon:
Welcome, Mike Engle, Chi...
Vlog: 9/11 Commemoration
As human beings, we have an innate desire to own what we create. Our identity is no different. In the physical world, a person who wants to prove their identity usually does so via a driver’s licen...
Decentralizing Identity for Enhanced User Control
Part 3
In parts 1 and 2 of this series I discussed the transition underway in the IAM industry to passwordless authentication and the reasons why 1Kosmos has taken the path to passwordless throu...
Identity Based Authentication: Conflux of ID & Authentication
Part 2
In part 1, I provided some needed context for moving from passwords to identity for user authentication. Now, let’s take a deeper look, and we’ll start with identity in the offline world....
Identity Based Authentication- Eliminating Passwords
Part 1
There seems to come a point in time when all industries hit an inflection point - where the old ways of doing things cede to the new.
We’ve reached this point in Identity and access ma...
Identity Based Authentication – The Transformation of IAM
Today we relaunched the 1Kosmos brand at a time when both business and government leaders are demanding improved security against cyber threats while international gangs feast on ransomware, data b...
1Kosmos Relaunch: How 1Kosmos Protects Identity from Attack
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss a variety of topics including ransomware and executive orders in their recent vlog.
Michael Cichon:
Hey Mike. Quite a day, huh?
Mike...
Vlog: Pipelines, Executive Orders, and More with Mike Engle
Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case y...
VPN and Virtual Desktop Security: How Going Passwordless Could Have Prevented the Colonial Pipeline Attack
The Challenge of Identity Management
Identity management has been a challenge for individuals and organizations for years, especially in the digital world. One individual may have a different digi...
1Kosmos BlockID’s NIST 800-63-3 Conformant & FIDO2 Certification Enhances Security with Fully Proofed Users
An authentication and identity management nightmare...?
It’s been all over the news in the last twenty-four hours: An increasing number of gas stations on the East Coast are without fuel! About 15...
The Reality Behind the Colonial Pipeline Attack
Identity Management vs. Decentralized Identity
What exactly does identity management mean? Broadly, it is defined as tools that help companies manage the access rights of all of their employees....
How Can Decentralized Identity Help With Identity Management?
Why is having a digital identity important? It simply puts data back in the hands of users. Here are some startling facts about a world without digital identity:
I have no choice but to share ...
Digital Identity: The Future of Identity
How Did Cybersecurity Investments Fare in 2020?
Nearly every industry in the world has drastically changed in the last year, with finance being no exception. Although investment spending decreas...
Trends in Cybersecurity Funding and Investment
HR managers say the top three biggest challenges they face with onboarding are inconsistencies in application across the organization (44 percent), competing priorities (39 percent), and measuring ...
Employee Onboarding: Eliminate Identity Compromises
When Brad Smith, Microsoft's President, talks about the SolarWinds attack he certainly doesn't sugarcoat what is now known as the months-long hacking campaign that affected US government agencies a...
Why the SolarWinds Attack Worked…
Identity service providers create, maintain, and manage identity information for users and also provide authentication services to relying applications within a federation or distributed network. T...
The Gap Identity Service Providers Must Fill
Today, I’m pleased to announce that my new venture 1Kosmos is exiting stealth mode with a $15 million investment from ForgePoint Capital. With this Series A funding and our brand-new advisory board...