Here’s a bombshell: The Financial Crimes Enforcement Network reports that identity-related theft and crimes total $1 billion per month on average! And twenty-five percent ($250,000,000) of this exo...
Have you ever responded to an unsolicited email from a barrister located in Nigeria who, out of the blue, contacted you? For some inexplicable reason, he saw you as a kind and generous person who u...
Vaccine Released Against Identity Compromises
Employees face a challenge daily, actually multiple times per day, having to access multiple systems and applications throughout the day to do their job. They have to unlock their Windows desktop, ...
Workforce Authentication Challenges and Best Practices
Employees face a challenge on a daily basis, and this challenge consists of having to access multiple systems and applications throughout the day, like unlocking a Windows desktop, logging into int...
Audio Blog: Challenges of Password Management and Best Practices
Today most organizations rely on very old and tired forms of authentication for system access. The combination of username, password, and sometimes a second factor do not prove to you who is at the...
Importance of ID-Proofing and Authentication in This “New Normal” Era.
For 1Kosmos, what does Identity proofing, or ID proofing in the workforce mean?
Well, for us, ID proofing is an irrefutable approach that is used to verify and authenticate the identity of an em...
Audio Blog: Workforce ID Proofing
The 7 Foundational Principles of Privacy by Design:
1. Proactive not Reactive; Preventative not Remedial
The Privacy by Design approach is characterized by proactive rather than reactive meas...
Privacy by Design
“Arguments over the correct interpretation of an oracle were common, but the oracle was always happy to give another prophecy if more gold was provided.” Wow! Already in 1400 BC! So many civilizati...
The Blockchain Oracle Never Won the America’s Cup
By definition, Blockchain is about eliminating intermediaries by powering a peer-to-peer ecosystem, where data is validated by participants to the network, whoever and wherever they are. Blockchain...
Top 3 Advantages of Private Blockchain
Blockchain technology requires a significant volume of equipment to run adequately. It is indeed not farfetched to hear that hundreds if not thousands of computers are required to form a single Blo...
The Carbon Footprint of Blockchain
If your organization is using one of those “passwordless” solutions out there, it’s very likely your employees and/or customers data is stored inside a centralized cloud system, where it is not enc...
Biometrics and Blockchain: A Powerful Match
Let’s start with the truth: Blockchain is not for everybody. After all, “truth is like the sun. You can shut it out for a time, but it ain’t goin’ away.” So why not speak about it from the very get...
Does Your Organization Need Blockchain?
How do you feel when a website requires you to surrender your birthdate as a requirement to complete a transaction?
If you are like me, you feel equal parts irritated and concerned. Irritated be...
CTO Insights: What is Self-Sovereign Identity?
The skeptics are taking over! Well, it certainly sounds like it when reading what the mainstream media have to say about Blockchain technology. Some do not hesitate to see it as the biggest hoax ev...
Where Lies the Future of Blockchain?
... Why we need to focus on identity, and why now.
We’re living through unprecedented times. Companies, communities, and individuals are scrambling to make sense of a crisis of historic magnitud...
Digital Identity in a COVID World…
The Anatomy of The Chain (Pt. 4 of 4)
Congratulations on making it to the fourth and final leg of the journey we started in September. Given the magnitude of effect blockchain is having and will h...
CTO Insights (IDentifier February 2020)
Blockchain, as we all know, a decentralized, peer-to-peer system with no central authority managing data flow, and immutable database that not only records the financial transaction but also stores...
EU’s GDRP and its Effect on the Blockchain
Democratization and freedom-enhancing characteristics of the blockchain seen in many projects also apply in the case of consumer genomics , which is the concept of uplifting organizations to the bl...
Blockchain Genomics
Hello and thank you for joining me in this third part of a series where we are exploring the anatomy and features of the blockchain. In the September 2019 IDentifier,
I introduced the blockchain...
CTO Insights (IDentifier November 2019)
In the September 2019 IDentifier, I introduced the blockchain concept and explained how it provides a different and superior method of storing data relative to traditional centralized databases. In...
CTO Insights (IDentifier October 2019)
British Airways. T-Mobile. Facebook. Google. What do they all have in common? They were all targets of successful database hacks last year. These hacks compromised the identities of tens of million...
CTO Insights (IDentifier September 2019)
On May 22, 2018, the U.S. Securities and Exchange Commission (SEC) filed a complaint against Titanium Blockchain, an Israeli start up in the middle of its ICO at the time. According to the SEC, the...
Titanium Blockchain: Why it Failed
Facebook is reportedly working on a cryptocurrency money transfer application that will be integrated into WhatsApp. The service, which is set to be launched in India upon approval, will apparently...
Facebook Targets Indian Money Transfer Market Using Crypto
Hackers are coming up with innovative ways to spread crypto mining malware. According to a new report, over 400,000 routers have been infected by a cryptojacking malware that specifically targets M...