An authentication and identity management nightmare...?
It’s been all over the news in the last twenty-four hours: An increasing number of gas stations on the East Coast are without fuel! About 15...
The Reality Behind the Colonial Pipeline Attack
HR managers say the top three biggest challenges they face with onboarding are inconsistencies in application across the organization (44 percent), competing priorities (39 percent), and measuring ...
Employee Onboarding: Eliminate Identity Compromises
Zero Trust is a buzzword with which cybersecurity folks are quite familiar. I understand, you’re surprised. Zero Trust has nothing to do with the Amazon packages your spouse hides from you. Rather,...
Zero Trust: Don’t Believe the Hyp(r)e!
Identity service providers create, maintain, and manage identity information for users and also provide authentication services to relying applications within a federation or distributed network. T...
The Gap Identity Service Providers Must Fill
Still today, the number one security problem pertains to identity and passwords.
More than 80 percent of data breaches that have occurred in the last ten years involve brute-force or the utilizati...
About Gartner’s Top Security Projects for 2021
Reality has just caught up with us. The new COVID-19 variants (there seems to be a new one every week since the beginning of the year) is spreading around the world at a worrisome pace. Most wester...
Remote Access Challenges and The Solution
It’s already mid-January and Google has been filled with references to web pages ranking what is supposedly the best to come in 2021 for a multitude of things. Spoiler alert: this blog isn’t about ...
2021 Top-5 Cyber Security Priorities
We’ve all been exposed to social logins. Social logins allow users like you and me to access websites or create accounts on websites by using existing social account credentials that we’ve already ...
Social Logins: The Other Side of The Coin
As much as Bud Fox, under the alias “Blue Horseshoe,” shared his love for Anacott Steel on the phone with a Wall Street reporter with the hope of manipulating the markets, there is one industry tha...
When Fintech and Cyber Attacks Walk Hand in Hand
How does your organization onboard a new employee?
I’m not talking about the distribution of the corporate booklet that brags about the socially responsible stance the company takes in the commu...
New Employee Onboarding: A Hacker’s Dream
Last night I woke with a start, sweating heavily. I dreamed that Facebook had contacted me to ask if they could sell Amazon some of the data I shared to create an account along with some behavioral...
Decentralized Identity – Should you (really) own your Identity?
Once a vaccine for COVID-19 becomes available for use in the United States, officials will start the process of delivering doses to states, counties and cities and will oversee their administration...
COVID Test and Decentralized Identity
Synthetic identity fraud accounts for 80 percent of all credit card fraud losses (Source: FTC). In 2019, there were 7,098 reported breaches that exposed 15.1 billion records, which represented a 28...
How Know Your Customer (KYC) on Steroids Looks Like
A second wave of COVID-19 has started to wash across Europe and the United States. So, who knows when there is going to be a return to normality? For the past several months, many organizations hav...
VPN and Virtual Desktop Security Debunked
Some say that in the real (physical) world, to prove one’s identity is an unambiguous process. For example, when you show up at an airport’s TSA security check, you’re required to show a government...
The Stakes Behind Using Digital Identities
Banking is a highly regulated industry and for good reason: it involves money and lots of it. Regulations in the banking industry are necessary to protect the government, financial institutions (fr...
The One Solution that Reconciles GDPR and PSD2
In 2004, hackers compromised the credentials of Nortel’s CEO Frank Dunn to steal about 800 ultra-sensitive documents and send them to an IP address registered to Shanghai Faxian Corp, a front compa...
The Dramatic Consequences of Identity Compromises
Here’s a bombshell: The Financial Crimes Enforcement Network reports that identity-related theft and crimes total $1 billion per month on average! And twenty-five percent ($250,000,000) of this exo...
Fake Identities Are Not Fake News
Have you ever responded to an unsolicited email from a barrister located in Nigeria who, out of the blue, contacted you? For some inexplicable reason, he saw you as a kind and generous person who u...
Vaccine Released Against Identity Compromises
Employees face a challenge daily, actually multiple times per day, having to access multiple systems and applications throughout the day to do their job. They have to unlock their Windows desktop, ...
Workforce Authentication Challenges and Best Practices
Employees face a challenge on a daily basis, and this challenge consists of having to access multiple systems and applications throughout the day, like unlocking a Windows desktop, logging into int...
Audio Blog: Challenges of Password Management and Best Practices
For 1Kosmos, what does Identity proofing, or ID proofing in the workforce mean?
Well, for us, ID proofing is an irrefutable approach that is used to verify and authenticate the identity of an em...
Audio Blog: Workforce ID Proofing
“Arguments over the correct interpretation of an oracle were common, but the oracle was always happy to give another prophecy if more gold was provided.” Wow! Already in 1400 BC! So many civilizati...
The Blockchain Oracle Never Won the America’s Cup
By definition, Blockchain is about eliminating intermediaries by powering a peer-to-peer ecosystem, where data is validated by participants to the network, whoever and wherever they are. Blockchain...
Top 3 Advantages of Private Blockchain
Blockchain technology requires a significant volume of equipment to run adequately. It is indeed not farfetched to hear that hundreds if not thousands of computers are required to form a single Blo...
The Carbon Footprint of Blockchain
If your organization is using one of those “passwordless” solutions out there, it’s very likely your employees and/or customers data is stored inside a centralized cloud system, where it is not enc...
Biometrics and Blockchain: A Powerful Match
Let’s start with the truth: Blockchain is not for everybody. After all, “truth is like the sun. You can shut it out for a time, but it ain’t goin’ away.” So why not speak about it from the very get...
Does Your Organization Need Blockchain?
The skeptics are taking over! Well, it certainly sounds like it when reading what the mainstream media have to say about Blockchain technology. Some do not hesitate to see it as the biggest hoax ev...