Mike Engle:
Hi, everybody. My name is Mike Engle, co-founder and head of strategy here at 1Kosmos. I'm joined today by Jens Hinrichsen. Say hello, Jens.
Jens Hinrichsen:
Hello, everybody.
M...
The nation of Thailand has a ready response for governments around the world seeking insights on implementing digital identity at scale: Phuket.
In recent years, the Thai island paradise of Phuk...
Digital Identity Spotlight: Thailand
In an era where identity theft and fraud are rampant, understanding the complexities of customer identity verification is crucial for businesses, especially in the financial sector. This involves m...
Navigating the Complexities of Modern Customer Identity Verification
A few weeks ago, we had the pleasure of attending Identiverse 2024, the premier conference dedicated to identity and security. Now that we’ve had time to reflect, we’re excited to share our key tak...
Identiverse 2024: Key Takeaways from the Conference
Join Michael Cichon, CMO at 1Kosmos, and Vikram Subramaniam, VP of Solutions, as they delve into the alarming rise of deepfakes. Discover how this evolving technology threatens security and authent...
Vlog: Defeating Deepfakes
As a leading provider of identity management solutions, 1Kosmos is excited to announce our new capability as a Credential Service Provider (CSP) for government agencies. This development represents...
Elevating Government Digital Transformation with an Advanced Credential Service Provider – 1Kosmos
Less than a month into 2024 and password spraying is being named as the origin for our first eye-opening cyber-attack. In a blog post, Microsoft has identified Midnight Blizzard, the Russian state-...
Mitigating Midnight Blizzard’s Password Spraying Cyber Attack: Insights and Solutions by 1Kosmos
"Fast" and "frictionless" onboarding for customers, workers and citizens is an elusive goal. Sure, identity verification is crucial, but so is verifying claims such as educational qualifications, a...
Trust and Verify–Why Reusable Verified Credentials Are So Essential to Modern IAM
Dive into the dynamic world of digital identity with Rob MacDonald, VP of Product Marketing, and Huzefa Olia, Co-founder and COO, in our latest vlog! Join this insightful conversation as they unpac...
Vlog: What the UK Government Digital Identity and Attributes Trust Framework Certification Means for 1Kosmos
Demands by residents for contactless services have accelerated the need for digital government services, but rampant identity fraud is impeding digital transformation and costing taxpayers millions...
Securing Digital Government Services with Credential Service Providers
For far too many organizations, Identity and Access Management (IAM) has become a study in locking the storm window while leaving the front door wide open. From MGM to Facebook to T-Mobile and beyo...
What a Difference Identity Makes: Why IAM Keeps Falling Short–and How to Fix It
Identity Governance is a beacon for organizations aiming to maintain regulatory compliance, safeguard operations and boost efficiency. Let's demystify this term: Identity Governance, tailored for o...
Identity Governance for Organizations: A Step-by-Step Guide to Implementation and Best Practices
Whether it's Henry the Navigator leading The Age of Discovery or Cristiano Ronaldo nailing a mid-air pirouette on the football field, Portugal has long been home to game-changing innovation—and dig...
Digital Identity Spotlight: Portugal
Introduction
Have you ever considered how identity verification is handled? Do not look other than eKYC. The complexity of eKYC will be unlocked with this article. Join us as we dive deep into thi...
Understanding eKYC: An In-Depth Overview
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by the VP of Solutions, Vikram Subramanian to discuss inserting identity into your SSO implementation.
Robert Mac...
Inserting Identity into Your SSO Implementation
With the rise of two-factor authentication and age verification, we're arming businesses with advanced tools to shield privacy and build confidence. This article will explore the evolution of custo...
From Traditional to Revolutionary: The Evolution of Customer Verification Methods
Introduction
Money laundering, the process of making illicitly gained money appear legitimate, has far-reaching implications for the global economy. It can serve as a lifeline for criminal organiz...
A Comprehensive Insight into Anti-Money Laundering Compliance
Introduction
Businesses today are at a crossroads of limitless prospects and invisible obstacles like fraud and money laundering as they navigate the exciting but treacherous seas of digital innov...
Know Your Business: The Practical Guide to KYB Checks
What Is Identity Orchestration?
Identity Orchestration is an Identity and Access Management (IAM) approach that automates managing and securing digital identities across diverse platforms, primari...
What Is Identity Orchestration? (Next Evolution of IAM?)
Today ones and zeros carry more weight than paper and ink; the ability to sniff out the genuine from the fraudulent has become an art form. Document verification, a seemingly mundane process, opera...
Unlocking Security with Document Verification: A Detailed Overview
If you want a telling glimpse at why Singapore ranks among the world's leaders in digital identity, look no further than this summer's British invasion. No, this former colony and small southeast A...
Digital Identity Spotlight: Singapore
Identity Threat Detection and Response (ITDR) is a collection of security tools and practices for monitoring, identifying, and responding to identity-related cybersecurity threats. ITDR solutions c...
What Is Identity Threat Detection & Response (ITDR)?
"Identity fabric" isn't a solution in and of itself, but rather represents a comprehensive and holistic approach to managing digital identities and security. This approach prioritizes flexible, sca...
What Is an Identity Fabric? (The Next Evolution of IAM?)
What Is Federated Identity?
Federated identity refers to linking a person's electronic identity and attributes stored across multiple identity management systems. These systems use common protocol...