Pride month is a time when we celebrate the diversity of human identity and recognize the importance of embracing and honoring individuals for who they truly are. It is a reminder that everyone des...
A Celebration of Pride Month: Embracing Inclusive Identity Proofing and Authentication
Detecting stolen and synthetic identities at the very front end of new account origination for every type of user can pay huge dividends but too often, tightening fraud controls can deliver an alie...
Trends in Identity Verification
As we close the celebration of the 19th annual Cybersecurity Awareness Month this October, it’s an ideal time to focus on the need to improve all cybersecurity measures by eliminating passwords and...
Celebrating the 19th Annual Cybersecurity Awareness Month
What is fingerprint verification? Fingerprint verification uses a fingerprint scan to identify and verify that a user is who they say they are. Fingerprint authentication is the most popular way to...
Fingerprint Verification: How Does It Work?
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
Driver’s licenses were one of the top three most breached data attributes in 2021, according to the Identity Theft Resource Center (ITRC). To make matters worse, many driver’s licenses are counterf...
Achieve a Higher Level of Identity Assurance with BlockID's AAMVA Integration
With hackers becoming increasingly better at cracking logins, what are good password alternatives to protect your account and increase network security?
What can be used instead of passwords?
...
Top 10 Password Alternatives (Is the Future Passwordless?)
What is the future of biometrics, and are there opportunities for my business to become more secure through biometric authentication? Keep reading to find out.
What is the future of biometrics?
...
What Is the Future of Biometric Technology? Trends to Watch
Problems with Passwords
We all know that it is risky to authenticate employees, contractors, citizens and customers with passwords. The proof is in the seemingly endless list of credential based s...
Passwordless Authentication Has An Identity Crisis
1Kosmos CMO, Michael Cichon, and Outseer CMO, Armen Najarian, discuss the 1Kosmos and RSA/Outseer partnership in their recent vlog.
Michael Cichon:
Welcome to the 1Kosmos video log. Armen Naj...
Vlog: 1Kosmos and RSA/Outseer Partnership with Armen Najarian and Michael Cichon
New hire fraud is a top concern for Chief Security Officers (CSOs) in most organizations. With the rise of remote work during the COVID-19 pandemic, these concerns have only been exacerbated. Many ...
Is Your New Employee Really Who They Say They Are?
What is an Identity Verification System?
An identity verification systems is a type of software that ensures a person is who they claim to be; for businesses, user identities need to be verified t...
Identity Verification Systems Explained
The Old Way: Friction Filled Authentication
In today’s digital world, most of us face authentication problems on a daily basis. Whether your records were some of the 37 billion that were compromis...
Introducing the 1Kosmos Appless Feature
A random jumble of letters is a secure password, but will you remember it? Password management can secure your account without memorizing these long passwords.
What is Password Management?
Passwo...
Guide to Password Management for Employees
Biometric password: making you the password. Here’s how biometric logins are more secure and remove the need to memorize a password.
What is a biometrics login? A biometric login uses an individ...
Intro to Biometric Passwords
Identification is only one part of the detection process; add in authentication and you can strongly guarantee a user is who they truly claim to be.
How Does Identity Authentication Work?
Verifyi...
How Identity Authentication Works
Curious about passwordless authentication? Wondering how it can create a more secure login? We'll walk you through what it is and how it works in an enterprise.
Is passwordless authentication sa...
Guide to Passwordless Authentication
During this year’s RSA conference, 1Kosmos was named a Global InfoSec Awards winner in the Next-Gen in Blockchain Security category by Cyber Defense Magazine (CDM), the industry’s leading electroni...
1Kosmos Wins Global InfoSec Award During RSA Conference 2021
The Colonial Pipeline Attack: An Authentication Crisis
If you live on the east coast of the United States, you are probably still facing the consequences of the Colonial Pipeline Attack: scrambl...
Could CEOs Face Criminal Charges for Negligent Cybersecurity Standards?
Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case y...
VPN and Virtual Desktop Security: How Going Passwordless Could Have Prevented the Colonial Pipeline Attack
The Challenge of Identity Management
Identity management has been a challenge for individuals and organizations for years, especially in the digital world. One individual may have a different digi...
1Kosmos BlockID's NIST 800-63-3 Conformant & FIDO2 Certification Enhances Security with Fully Proofed Users
Identity Management vs. Decentralized Identity
What exactly does identity management mean? Broadly, it is defined as tools that help companies manage the access rights of all of their employees....
How Can Decentralized Identity Help With Identity Management?
Passwordless Authentication Makes 1Kosmos the Most Advanced Startup
Passwordless authentication is one of the top features that led Alestra to call 1Kosmos the “most advanced startup” in their 5th...
1Kosmos Is Selected for the Alestra NAVE Program
Why is having a digital identity important? It simply puts data back in the hands of users. Here are some startling facts about a world without digital identity:
I have no choice but to share ...
Digital Identity: The Future of Identity
What is the most important piece of information to know when you are securing a financial transaction, launching a nuclear weapon, or simply onboarding a new employee? The answer is that you absolu...
Why Is Authentication Important?
Passwords have been used to access computers since 1961 when an operating system at the Massachusetts Institute of Technology first required login credentials. 60 years later, despite the massive a...
The Benefits of Passwordless Authentication
How Did Cybersecurity Investments Fare in 2020?
Nearly every industry in the world has drastically changed in the last year, with finance being no exception. Although investment spending decreas...
Trends in Cybersecurity Funding and Investment
Long before the COVID-19 pandemic, employees used their work devices to check their social or news notifications while on break. Now, the lines between personal and work uses are even more blurred ...
About Gartner's 5 Key Predictions for IAM and Fraud Detection
Phishing, smishing, vishing... Outside of haunting CISOs day and night, what’s the difference? Well, phishing can be considered the parent of them all. It involves sending targeted email messages t...