Identity-related security is paramount in our modern threat landscape, touching on almost any form of vulnerability related to cybersecurity.
What Is Identity Lifecycle Management? Identity Life...
It shouldn't be a surprise that Belgium ranks among the vanguards of digital identity. The digital world as we know it may never have existed without this tiny northwestern European country of just...
Digital Identity Spotlight: Belgium
Pride month is a time when we celebrate the diversity of human identity and recognize the importance of embracing and honoring individuals for who they truly are. It is a reminder that everyone des...
A Celebration of Pride Month: Embracing Inclusive Identity Proofing and Authentication
Account takeover prevention actively reduces attack surfaces by which hackers can break into and use system accounts for malicious purposes.
What Is an Account Takeover Attack?
Account takeover (...
What Is Account Takeover Prevention? Preventing ATO Fraud
LinkedIn has joined the ranks of social media platforms offering ID verification badges designed to assure users that the person associated with a profile is in fact who they claim to be. Given org...
LinkedIn’s ID Verification – One Small Step in the Right Direction
What Is Windows Credential Manager & How Does It Work?
Windows Credential Manager is Windows software that stores authentication credentials that are used to log in to websites or other computers ...
What Is Windows Credential Manager & How Does It Work?
The Second Payment Services Directive (PSD2) is an EU law regulating electronic payment services within EU states and the European Economic Area (EEA).
As economic ties between the EU member st...
What Is PSD2 Compliance? How Does It Affect Your Business?
Detecting stolen and synthetic identities at the very front end of new account origination for every type of user can pay huge dividends but too often, tightening fraud controls can deliver an alie...
Trends in Identity Verification
In this vlog, our COO, Huzefa Olia, is joined by Kevin Shanley, Principal at Amazon Web Services Identity to discuss bringing verified identity and passwordless to the masses.
https://player.vim...
Bringing Verified Identity and Passwordless to the Masses
https://player.vimeo.com/video/825146474
Huzefa Olia:
Good morning, Robert. How are you?
Robert MacDonald:
I'm good Huzefa. How are you this morning?
Huzefa Olia:
Wonderful. I'm so exci...
European Identity and Cloud Conference 2023
FINRA compliance is a series of requirements that apply to financial brokers and their representatives meant to ensure that they adhere with anti-fraud laws. FINRA guides critical anti-fraud measur...
What Is FINRA Compliance? Key Requirements & Responsibilities
The increasing prevalence of financial crimes, such as money laundering, terrorist financing, and fraud, has led to stringent regulatory measures designed to protect consumers. These include using ...
What Is Enhanced Due Diligence? When Is It Needed?
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by our VP of Product Management, Javed Shah, and our Marketing Manager, Abigail Edwards, to discuss their experience at Ga...
Gartner IAM Summit
User account access is a foundational form of cybersecurity, addressing both internal and external threats.
How does Privileged Access Management (PAM) aid security? PAM centralizes privileged d...
What Is Privileged Access Management(PAM)? How It Works
In this vlog, 1Kosmos CSO, Mike Engle, is joined by CodeCluster CEO, Mike Vitez, to discuss how 1Kosmos, Arculus, and CodeCluster partner to reduce fraud.
https://player.vimeo.com/video/...
1Kosmos, CodeCluster, and Arculus Partner to Reduce Fraud
Hackers attack computer systems to steal information. Some of the most important types of information they can steal are access credentials like usernames/passwords or PINs.
Why is credential ac...
What Is Credential Access?
While phishing and network attacks are still the most common hacks around, old-fashioned system hacking is still a threat to enterprises.
What is credential dumping? It is when a hacker uses exp...
What Is Credential Dumping & How To Prevent It?
Cyber threats are becoming increasingly sophisticated with the number of bad actors involved increasing at an alarming rate. New and sophisticated techniques are being used that have evolved over t...
Digital Transformation of Personnel Onboarding
It's 2023—do you know what your identity is doing? As the adoption of digital channels continues to be matched by corresponding levels of fraud, the ability to achieve digital identity verification...
6 Digital Identity Predictions for 2023
With the EU becoming a major economic player, its rules and regulations are being felt around the business world.
What is GDPR? GDPR is a set of regulations specific to businesses in the EU gove...
7 Core Principles for GDPR Data Protection
Online, always-on finance and banking have led to significant security challenges for institutions trying to thwart international terrorism, identity theft, and fraud.
What are KYC regulations? ...
What Is KYC (Know Your Customer) For Banking?
In this vlog, 1Kosmos CMO, Michael Cichon, is joined by 1Kosmos CSO, Mike Engle, to discuss how digital identity can modernize healthcare. If you are interested in learning more about this topic, p...
The Role of Digital Identity in Modernizing Health Care
The Importance of Digital Identity and Wallets in Healthcare
Traditional processes in today's healthcare landscape have left sensitive personal information scattered across a lifetime of providers...
The Importance of Digital Identity in Healthcare
In this vlog, 1Kosmos' Product Manager, Sheetal Elangovan, joins 1Kosmos' CMO, Michael Cichon, to discuss how employee onboarding can be fixed with document verification and identity based authenti...