Why is having a digital identity important? It simply puts data back in the hands of users. Here are some startling facts about a world without digital identity:
I have no choice but to share ...
What is the most important piece of information to know when you are securing a financial transaction, launching a nuclear weapon, or simply onboarding a new employee? The answer is that you absolu...
Why Is Authentication Important?
Passwords have been used to access computers since 1961 when an operating system at the Massachusetts Institute of Technology first required login credentials. 60 years later, despite the massive a...
The Benefits of Passwordless Authentication
How Did Cybersecurity Investments Fare in 2020?
Nearly every industry in the world has drastically changed in the last year, with finance being no exception. Although investment spending decreas...
Trends in Cybersecurity Funding and Investment
HR managers say the top three biggest challenges they face with onboarding are inconsistencies in application across the organization (44 percent), competing priorities (39 percent), and measuring ...
Employee Onboarding: Eliminate Identity Compromises
Zero Trust is a buzzword with which cybersecurity folks are quite familiar. I understand, you’re surprised. Zero Trust has nothing to do with the Amazon packages your spouse hides from you. Rather,...
Zero Trust: Don’t Believe the Hyp(r)e!
When Brad Smith, Microsoft's President, talks about the SolarWinds attack he certainly doesn't sugarcoat what is now known as the months-long hacking campaign that affected US government agencies a...
Why the SolarWinds Attack Worked…
Identity service providers create, maintain, and manage identity information for users and also provide authentication services to relying applications within a federation or distributed network. T...
The Gap Identity Service Providers Must Fill
Today, I’m pleased to announce that my new venture 1Kosmos is exiting stealth mode with a $15 million investment from ForgePoint Capital. With this Series A funding and our brand-new advisory board...
Why 1Kosmos is set to fill a Void in Cybersecurity & Digital Economy
Long before the COVID-19 pandemic, employees used their work devices to check their social or news notifications while on break. Now, the lines between personal and work uses are even more blurred ...
About Gartner’s 5 Key Predictions for IAM and Fraud Detection
Still today, the number one security problem pertains to identity and passwords.
More than 80 percent of data breaches that have occurred in the last ten years involve brute-force or the utilizati...
About Gartner’s Top Security Projects for 2021
Phishing, smishing, vishing... Outside of haunting CISOs day and night, what’s the difference? Well, phishing can be considered the parent of them all. It involves sending targeted email messages t...
The Bulletproof Solution to Prevent Vishing Attacks
Reality has just caught up with us. The new COVID-19 variants (there seems to be a new one every week since the beginning of the year) is spreading around the world at a worrisome pace. Most wester...
Remote Access Challenges and The Solution
It’s already mid-January and Google has been filled with references to web pages ranking what is supposedly the best to come in 2021 for a multitude of things. Spoiler alert: this blog isn’t about ...
2021 Top-5 Cyber Security Priorities
We’ve all been exposed to social logins. Social logins allow users like you and me to access websites or create accounts on websites by using existing social account credentials that we’ve already ...
Social Logins: The Other Side of The Coin
As much as Bud Fox, under the alias “Blue Horseshoe,” shared his love for Anacott Steel on the phone with a Wall Street reporter with the hope of manipulating the markets, there is one industry tha...
When Fintech and Cyber Attacks Walk Hand in Hand
How does your organization onboard a new employee?
I’m not talking about the distribution of the corporate booklet that brags about the socially responsible stance the company takes in the commu...
New Employee Onboarding: A Hacker’s Dream
Last night I woke with a start, sweating heavily. I dreamed that Facebook had contacted me to ask if they could sell Amazon some of the data I shared to create an account along with some behavioral...
Decentralized Identity – Should you (really) own your Identity?
Once a vaccine for COVID-19 becomes available for use in the United States, officials will start the process of delivering doses to states, counties and cities and will oversee their administration...
COVID Test and Decentralized Identity
Synthetic identity fraud accounts for 80 percent of all credit card fraud losses (Source: FTC). In 2019, there were 7,098 reported breaches that exposed 15.1 billion records, which represented a 28...
How Know Your Customer (KYC) on Steroids Looks Like
A second wave of COVID-19 has started to wash across Europe and the United States. So, who knows when there is going to be a return to normality? For the past several months, many organizations hav...
VPN and Virtual Desktop Security Debunked
Some say that in the real (physical) world, to prove one’s identity is an unambiguous process. For example, when you show up at an airport’s TSA security check, you’re required to show a government...
The Stakes Behind Using Digital Identities
Banking is a highly regulated industry and for good reason: it involves money and lots of it. Regulations in the banking industry are necessary to protect the government, financial institutions (fr...
The One Solution that Reconciles GDPR and PSD2
In 2004, hackers compromised the credentials of Nortel’s CEO Frank Dunn to steal about 800 ultra-sensitive documents and send them to an IP address registered to Shanghai Faxian Corp, a front compa...