A SIM swapping scam can not only take over your phone but can also become detrimental to your financial health as scammers can steal bank logins or data.
What does SIM swapping do? SIM swapping ...
In this vlog, our CMO, Michael Cichon, is joined by our CSO, Mike Engle, to discuss how digital identity verification can be used to combat synthetic identity fraud and account takeover. If you are...
Combatting Synthetic Identity Fraud and Account Takeover With Digital Identity Verification
As someone who's spent a career leading financial operations for successful cybersecurity startups such as Attivo Networks and Cloudmark, I knew it would be hard to resist an invitation from 1Kosmo...
3 Reasons I Joined 1Kosmos: Jilbert Washten
As we close the celebration of the 19th annual Cybersecurity Awareness Month this October, it’s an ideal time to focus on the need to improve all cybersecurity measures by eliminating passwords and...
Celebrating the 19th Annual Cybersecurity Awareness Month
While NIST's Cybersecurity Framework is probably the most well-known, there are other cybersecurity frameworks your organization should be aware of.
What is a cybersecurity framework? A cybersec...
Cybersecurity Framework & NIST: What You Need to Know
The principle of least privilege is meant to limit user access to protect the organization's information from being hacked or leaked.
What is the principle of least privilege?
The Principle o...
What Is the Principle of Least Privilege (POLP)?
In this vlog, Mike Engle and Michael Cichon discuss how government agencies can securely deliver digital services to their constituents.
https://player.vimeo.com/video/761643613
&nb...
How to Preserve Privacy While Delivering Digital Government Services
RBAC, ABAC, and PBAC are all access controls that can help keep certain information or systems restricted to those based on user, environment, role and more.
What do RBAC, ABAC and PBAC stand fo...
RBAC vs ABAC vs PBAC: Access Control Uses & Definitions
Contractor Fraud and the Rise of Remote Work
Many organizations require the use of contractors, known as third parties. Managing these non-employees through the HR system, the authoritative identi...
Stopping the Latest Scam in Remote Contractor Onboarding
Here at 1Kosmos, It’s been an action-packed September full of events, analyst mentions, awards and more. One of these exciting events was an Innovation Festival in the Philippines hosted by our cus...
Reflections from UnionDigital Innovation Festival
It's been a very exciting summer for the team here at 1Kosmos. Analysts are taking notice! We are honored to be recognized as an overall leader in the KuppingerCole Leadership Compass Providers of ...
1Kosmos Recognized as a Leader in KuppingerCole Providers of Verified Identity 2022
Recently, I came across an article titled “No easy fix for ID verification for government benefits” that explored a major challenge that governments have been facing for the past few years. This pr...
Is There Really No Easy Fix for ID Verification for Government Benefits?
We are excited to share that 1Kosmos has been mentioned in 5 recent Gartner® Hype Cycle™ reports:
Hype Cycle for Privacy 2022
Hype Cycle for Digital Government Services, 2022
Hype Cyc...
1Kosmos Mentioned in 5 Recent Gartner® Hype Cycle™ Reports
Synthetic identities can easily be mistaken for real identities and can wreak havoc on companies that fall victim. So how can you differentiate between the two?
What is synthetic identity theft?...
What Is Synthetic Identity Theft? New Path For Fraud?
Access control is a security measure that can prevent unauthorized access to sensitive information. But how can mandatory access control help with security?
What is mandatory access control? Man...
What Is Mandatory Access Control (MAC)?
In this vlog, our Chief Operating Officer, Huzefa Olia, joins our Chief Marketing Officer, Michael Cichon, to discuss why Okta needs an identity layer.
https://player.vimeo.com/video/740777974
...
Vlog: Why Okta Needs an Identity Layer
Driver’s licenses were one of the top three most breached data attributes in 2021, according to the Identity Theft Resource Center (ITRC). To make matters worse, many driver’s licenses are counterf...
Achieve a Higher Level of Identity Assurance with BlockID’s AAMVA Integration
CIP and KYC are vital procedures and guidelines to help keep customer data secure while also verifying a customer's identity.
What is KYC CIP? Know your customer and customer identification proc...
CIP vs. KYC: What’s the Difference?
Remote onboarding is becoming the new normal, and if your company doesn't adapt to the new work environment, your company will be left behind.
What is Remote Onboarding?
Remote onboarding is the ...
Remote Onboarding for the Modern Workforce
Hackers attack passwords systematically, and it's only a matter of time before they crack your login. What best practices can help secure your account?
What are best practices for creating a pas...
Top 6 Password Security Best Practices
NIST compliance provides security standards for businesses handling federal information, but how do you meet these compliance regulations?
What is NIST compliance? NIST compliance is the Nationa...
What Is the NIST Compliance Framework & CMMC?
SOC 2 compliance should be at the top of the list for all technology services, software-as-a-service organizations, and service providers managing or storing customer data in the cloud.
What is ...
What Is SOC 2 Compliance & Certification?
The road to zero trust can be bumpy for nearly any organization. While CISOs need to make data and services accessible to their users, they also need to protect the same data and services in order ...
How to Defeat a Zero Trust Architecture
Business email compromise is one of the many types of phishing attacks targeting both large and small corporations for financial gain.
What is a BEC attack? A BEC attack is a type of phishing sc...