Your digital identity, including potential work logins, can be exposed to hackers and sold to the highest bidder, so what can you do to protect it?
What Is a Digital Identity?
A digital identity ...
In this vlog, Jim Ducharme, Chief Operating Officer at Outseer, and Michael Engle, Chief Strategy Officer at 1Kosmos, discuss how 1Kosmos and Outseer are partnering to prevent account takeover (ATO...
Vlog: 1Kosmos and Outseer Strategic Partnership Extends Use Cases of Outseer Fraud Manager
Problems with Passwords
Are passwords the weakest link in cybersecurity? We all know that it is risky to authenticate workers, citizens, and customers with passwords. The proof is in the seemingly...
3 Things Missing In Your Current Passwordless Strategy
Trusting no one and verifying everyone is a security measure businesses may not think to take, but this measure becomes the main gatekeeper with zero-trust identity.
What is a zero-trust approac...
What Is Zero Trust Identity Security? [Access Management]
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
In this vlog, 1Kosmos CMO, Michael Cichon, and 1Kosmos VP of Product Management, Javed Shah, discuss why it's important to onboard a third-party with identity-based authentication.
Michael...
How to Onboard a Third-Party with Identity-Based Authentication
With remote workers accessing documents in the cloud, authentication services have never become more important or relevant than they are right now.
What is the purpose of cloud authentication? ...
Cloud Authentication Services | Security for Enterprise IT
Identity Management (IAM) as a service will help protect your corporation from breaches and keep authentic users from accessing unauthorized information.
What is identity management as a service...
What Is Identity & Access Management as a Service?
Problems with Passwords
We all know that it is risky to authenticate employees, contractors, citizens and customers with passwords. The proof is in the seemingly endless list of credential based s...
Passwordless Authentication Has An Identity Crisis
An identity solution can be the difference between keeping your data secure and allowing hackers access to any digital information in your business.
So what is an identity solution? An identity ...
Identity Solutions: What To Look For
1Kosmos CMO, Michael Cichon, and Outseer CMO, Armen Najarian, discuss the 1Kosmos and RSA/Outseer partnership in their recent vlog.
Michael Cichon:
Welcome to the 1Kosmos video log. Armen Naj...
Vlog: 1Kosmos and RSA/Outseer Partnership with Armen Najarian and Michael Cichon
Today is another exciting day for the team here at 1Kosmos. Today, we are proud to announce our partnership with Outseer, the leader in payment authentication and monitoring cybersecurity and risk ...
1Kosmos and RSA/Outseer Partnership Protects Against Account Takeover (ATO) Attacks and Account Enrollment Fraud
What Is Multi-Factor Authentication?
Multi-factor authentication requires users to provide multiple credentials to access a system, which could include a username and password combination, a PIN, ...
What Is Multi-Factor Authentication (MFA) & How Does It Work?
Password Based Authentication Belongs in the Past
Password based authentication does not actually verify who is on the other end of the digital connection. This leads to anonymous users hiding beh...
Hyderabad Is Ready for Next-Gen MFA
Challenges In Digital Onboarding
With an increasingly digital world, identity fraud has become an even more pressing issue. To mitigate fraud, companies should embrace the same “Know Your Customer...
Digital Onboarding and Banking Experience Summit
Transitioning From Password Based Authentication to Identity Based Authentication
Passwords really aren’t the problem. It’s anonymous users hiding behind compromised credentials that represent one...
Building a Customer First Approach to Identity Based Authentication
Identity proofing solutions add a level of security to your enterprise and create a better user experience for your employees and customers.
What is identity proofing? Identity proofing is a pro...
What Is Identity Proofing & Verification?
In the first blog of this series, we positioned decentralization of identity as a construct that allowed for preservation of a user’s privacy in stark contrast to the invasion and exponential destr...
Decentralized Identity Management and User Data Sharing
What is Biometric Authentication?
Biometric authentication is the use of physical traits from users to verify their identity when they attempt to access systems or user accounts. In this discussio...
What Is Biometric Authentication? Pros, Cons & Use Cases
Customer identity and access management is the solution your business needs if you’re currently struggling with controlling customer user IDs.
What is CIAM? CIAM is an access management solution...
What is Customer Identity and Access Management (CIAM)?
In this vlog, our CSO, Mike Engle, and CMO, Michael Cichon, discuss marrying ID and authentication.
Michael Cichon:
Good morning, Michael Engle, Chief Strategy Officer at 1Kosmos. Welcome bac...
Vlog: Marrying ID and Authentication
1Kosmos CTO, Rohan Pinto, and CMO, Michael Cichon, discuss the 1Kosmos platform, identity proofing, the NIST guidelines, blockchain technology and more in this vlog.
Michael Cichon:
Hello, Roha...
Vlog: The BlockID Platform with Rohan Pinto
In this vlog, 1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss the 20th anniversary of 9/11 and how the attacks changed our security landscape.
Michael Cichon:
Welcome, Mike Engle, Chi...
Vlog: 9/11 Commemoration
Biometric identifiers are now being used as an individual's biometric ID. With security becoming an increasingly important issue, biometrics are the way to go.
What does biometric mean? Biometri...