Join Rob MacDonald, VP of Product Marketing, and Mike Engle, Co-founder of 1Kosmos, as they discuss the recent cyber attack on MGM and explore the world of vishing (voice phishing) in this informat...
In the ever-evolving landscape of cybersecurity, it's crucial to stay up to date with the latest innovations and technologies designed to enhance online security. One such innovation that has gaine...
Demystifying Passkeys: A Future of Passwordless Authentication
Introduction
Traditional password-based authentication techniques are vulnerable to online attacks. Fortunately, a ground-breaking remedy called an identity-based passwordless authentication syste...
Defending Your Online Presence: Identity-Based Passwordless Authentication
Introduction
Have you ever considered how identity verification is handled? Do not look other than eKYC. The complexity of eKYC will be unlocked with this article. Join us as we dive deep into thi...
Understanding eKYC: An In-Depth Overview
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by the VP of Solutions, Vikram Subramanian to discuss inserting identity into your SSO implementation.
Robert Mac...
Inserting Identity into Your SSO Implementation
With the rise of two-factor authentication and age verification, we're arming businesses with advanced tools to shield privacy and build confidence. This article will explore the evolution of custo...
From Traditional to Revolutionary: The Evolution of Customer Verification Methods
Introduction
The digital transformation sweeping across the business landscape has made efficiency and security two sides of the same coin. User provisioning stands at this crossroads, orchestrati...
User Provisioning: The Key to Unlocking Seamless Workflow
Introduction
Money laundering, the process of making illicitly gained money appear legitimate, has far-reaching implications for the global economy. It can serve as a lifeline for criminal organiz...
A Comprehensive Insight into Anti-Money Laundering Compliance
Introduction
Cybersecurity is no longer just about setting a strong password or having an encrypted connection. As digital threats have evolved, so too have the mechanisms to counteract them. Cont...
Continuous Authentication: A Dynamic Approach to User Verification
Introduction
Businesses today are at a crossroads of limitless prospects and invisible obstacles like fraud and money laundering as they navigate the exciting but treacherous seas of digital innov...
Know Your Business: The Practical Guide to KYB Checks
Symmetric encryption (or “private key” encryption) is the process of using a single key to both encrypt and decrypt data. It’s called “private key” because the use of a single encryption key necess...
What Is Symmetric Encryption, How Does It Work & Why Use It?
What Is Identity Orchestration?
Identity Orchestration is an Identity and Access Management (IAM) approach that automates managing and securing digital identities across diverse platforms, primari...
What Is Identity Orchestration? (Next Evolution of IAM?)
Today ones and zeros carry more weight than paper and ink; the ability to sniff out the genuine from the fraudulent has become an art form. Document verification, a seemingly mundane process, opera...
Unlocking Security with Document Verification: A Detailed Overview
If you want a telling glimpse at why Singapore ranks among the world's leaders in digital identity, look no further than this summer's British invasion. No, this former colony and small southeast A...
Digital Identity Spotlight: Singapore
Identity Threat Detection and Response (ITDR) is a collection of security tools and practices for monitoring, identifying, and responding to identity-related cybersecurity threats. ITDR solutions c...
What Is Identity Threat Detection & Response (ITDR)?
Michael Cichon:
Well, hello everybody. This is Michael Cichon, chief Marketing Officer at 1Kosmos. I'm here today with our VP of solutions, Vik Subramanian.
Vik, welcome to the vlog. It's good ...
Vlog: Making the Most of Your Windows Hello Investment
"Identity fabric" isn't a solution in and of itself, but rather represents a comprehensive and holistic approach to managing digital identities and security. This approach prioritizes flexible, sca...
What Is an Identity Fabric? (The Next Evolution of IAM?)
What Is Federated Identity?
Federated identity refers to linking a person's electronic identity and attributes stored across multiple identity management systems. These systems use common protocol...
What Is Federated Identity? How It Works & Why
Identity-related security is paramount in our modern threat landscape, touching on almost any form of vulnerability related to cybersecurity.
What Is Identity Lifecycle Management? Identity Life...
Identity Lifecycle Management (ILM) Explained
Join Michael Cichon, CMO of 1Kosmos, and Mike Engle, CSO, as they discuss the journey to passwordless multifactor authentication in their insightful vlog. Discover the nuances between the passwordl...
Vlog: Overcoming Resistance to Change on the Journey to Passwordless MFA
It shouldn't be a surprise that Belgium ranks among the vanguards of digital identity. The digital world as we know it may never have existed without this tiny northwestern European country of just...
Digital Identity Spotlight: Belgium
Pride month is a time when we celebrate the diversity of human identity and recognize the importance of embracing and honoring individuals for who they truly are. It is a reminder that everyone des...
A Celebration of Pride Month: Embracing Inclusive Identity Proofing and Authentication
Account takeover prevention actively reduces attack surfaces by which hackers can break into and use system accounts for malicious purposes.
What Is an Account Takeover Attack?
Account takeover (...
What Is Account Takeover Prevention? Preventing ATO Fraud
LinkedIn has joined the ranks of social media platforms offering ID verification badges designed to assure users that the person associated with a profile is in fact who they claim to be. Given org...