Banking is a highly regulated industry and for good reason: it involves money and lots of it. Regulations in the banking industry are necessary to protect the government, financial institutions (fr...
In 2004, hackers compromised the credentials of Nortel’s CEO Frank Dunn to steal about 800 ultra-sensitive documents and send them to an IP address registered to Shanghai Faxian Corp, a front compa...
The Dramatic Consequences of Identity Compromises
Here’s a bombshell: The Financial Crimes Enforcement Network reports that identity-related theft and crimes total $1 billion per month on average! And twenty-five percent ($250,000,000) of this exo...
Fake Identities Are Not Fake News
Have you ever responded to an unsolicited email from a barrister located in Nigeria who, out of the blue, contacted you? For some inexplicable reason, he saw you as a kind and generous person who u...
Vaccine Released Against Identity Compromises
Today most organizations rely on very old and tired forms of authentication for system access. The combination of username, password, and sometimes a second factor do not prove to you who is at the...
Importance of ID-Proofing and Authentication in This “New Normal” Era.
For 1Kosmos, what does Identity proofing, or ID proofing in the workforce mean?
Well, for us, ID proofing is an irrefutable approach that is used to verify and authenticate the identity of an em...
Audio Blog: Workforce ID Proofing
The 7 Foundational Principles of Privacy by Design:
1. Proactive not Reactive; Preventative not Remedial
The Privacy by Design approach is characterized by proactive rather than reactive meas...
Privacy by Design
How do you feel when a website requires you to surrender your birthdate as a requirement to complete a transaction?
If you are like me, you feel equal parts irritated and concerned. Irritated be...
CTO Insights: What is Self-Sovereign Identity?
... Why we need to focus on identity, and why now.
We’re living through unprecedented times. Companies, communities, and individuals are scrambling to make sense of a crisis of historic magnitud...
Digital Identity in a COVID World…
British Airways. T-Mobile. Facebook. Google. What do they all have in common? They were all targets of successful database hacks last year. These hacks compromised the identities of tens of million...
CTO Insights (IDentifier September 2019)
Hackers are coming up with innovative ways to spread crypto mining malware. According to a new report, over 400,000 routers have been infected by a cryptojacking malware that specifically targets M...
Hackers Are Spreading Crypto Mining Malware via Routers
Anonymous, pseudonymous, or real identities can be uniquely mapped on the blockchain, offering us the promise of owning our own identities, and not having them controlled by Google or Facebook. The...
Blockchain-based Identity Ownerships and Representation
The truth of the popular statement "everyone is online now" gets more grounded with each day that passes. Daily, millions of people come online to carry out different activities ranging from resear...
How Blockchain Can Solve Identity Management Problems
Know your customer (KYC) and anti-money-laundering (AML) regulations require banks to know who they’re doing business with and ensure that they’re not participating in money laundering or terrorism...
KYC and AML
The finance industry is seeing big strides with using blockchain technology, but this is not the only industry that will be able to use this technology. While blockchain is strongly associated with...
A Blockchain-Based Digital Identity and Voting System
Elliptic Curve Digital Signature Algorithm or ECDSA is a cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners. While the private key is a secret n...
The Elliptic Curve Digital Signature Algorithm (ECDSA)
Previously, digital identity management was/is still considered as the ho-hum task that not even service provider but also consumer were getting irritated of getting their identity verify for each ...