It’s important for individuals to have more control and ownership over their digital identity and that can be done with decentralized identities.
What is a decentralized identity?
A decentralized...
Securing your digital identity on a blockchain is a smart move for your business if you find having a self-sovereign or decentralized identity important.
How does a blockchain verify identity? A...
Digital Identity Management on a Blockchain
Your digital identity, including potential work logins, can be exposed to hackers and sold to the highest bidder, so what can you do to protect it?
What Is a Digital Identity?
A digital identity ...
What Is a Digital Identity? [Importance of Digital IDs]
Trusting no one and verifying everyone is a security measure businesses may not think to take, but this measure becomes the main gatekeeper with zero-trust identity.
What is a zero-trust approac...
What Is Zero Trust Identity Security? [Access Management]
Dealing with complexity
Issues with passwords are well documented and education institutions are not immune to the issues and risks that passwords inject. To compound the security issue, these ins...
Identity is Shaping the Modern Campus
Identity Management (IAM) as a service will help protect your corporation from breaches and keep authentic users from accessing unauthorized information.
What is identity management as a service...
What Is Identity & Access Management as a Service?
An identity solution can be the difference between keeping your data secure and allowing hackers access to any digital information in your business.
So what is an identity solution? An identity ...
Identity Solutions: What To Look For
Identity proofing solutions add a level of security to your enterprise and create a better user experience for your employees and customers.
What is identity proofing? Identity proofing is a pro...
What Is Identity Proofing & Verification?
In the first blog of this series, we positioned decentralization of identity as a construct that allowed for preservation of a user’s privacy in stark contrast to the invasion and exponential destr...
Decentralized Identity Management and User Data Sharing
Customer identity and access management is the solution your business needs if you’re currently struggling with controlling customer user IDs.
What is CIAM? CIAM is an access management solution...
What is Customer Identity and Access Management (CIAM)?
In this vlog, 1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss the 20th anniversary of 9/11 and how the attacks changed our security landscape.
Michael Cichon:
Welcome, Mike Engle, Chi...
Vlog: 9/11 Commemoration
As human beings, we have an innate desire to own what we create. Our identity is no different. In the physical world, a person who wants to prove their identity usually does so via a driver’s licen...
Decentralizing Identity for Enhanced User Control
Part 3
In parts 1 and 2 of this series I discussed the transition underway in the IAM industry to passwordless authentication and the reasons why 1Kosmos has taken the path to passwordless throu...
Identity Based Authentication: Conflux of ID & Authentication
Part 2
In part 1, I provided some needed context for moving from passwords to identity for user authentication. Now, let’s take a deeper look, and we’ll start with identity in the offline world....
Identity Based Authentication- Eliminating Passwords
Part 1
There seems to come a point in time when all industries hit an inflection point - where the old ways of doing things cede to the new.
We’ve reached this point in Identity and access ma...
Identity Based Authentication – The Transformation of IAM
Today we relaunched the 1Kosmos brand at a time when both business and government leaders are demanding improved security against cyber threats while international gangs feast on ransomware, data b...
1Kosmos Relaunch: How 1Kosmos Protects Identity from Attack
1Kosmos CSO, Mike Engle, and CMO, Michael Cichon, discuss a variety of topics including ransomware and executive orders in their recent vlog.
Michael Cichon:
Hey Mike. Quite a day, huh?
Mike...
Vlog: Pipelines, Executive Orders, and More with Mike Engle
Colonial Pipeline Attack: An Identity Management Nightmare
You’ve probably seen the latest authentication and identity management nightmare sweeping the US: the Colonial Pipeline attack. In case y...
VPN and Virtual Desktop Security: How Going Passwordless Could Have Prevented the Colonial Pipeline Attack
The Challenge of Identity Management
Identity management has been a challenge for individuals and organizations for years, especially in the digital world. One individual may have a different digi...
1Kosmos BlockID’s NIST 800-63-3 Conformant & FIDO2 Certification Enhances Security with Fully Proofed Users
An authentication and identity management nightmare...?
It’s been all over the news in the last twenty-four hours: An increasing number of gas stations on the East Coast are without fuel! About 15...
The Reality Behind the Colonial Pipeline Attack
Identity Management vs. Decentralized Identity
What exactly does identity management mean? Broadly, it is defined as tools that help companies manage the access rights of all of their employees....
How Can Decentralized Identity Help With Identity Management?
Why is having a digital identity important? It simply puts data back in the hands of users. Here are some startling facts about a world without digital identity:
I have no choice but to share ...
Digital Identity: The Future of Identity
How Did Cybersecurity Investments Fare in 2020?
Nearly every industry in the world has drastically changed in the last year, with finance being no exception. Although investment spending decreas...
Trends in Cybersecurity Funding and Investment
HR managers say the top three biggest challenges they face with onboarding are inconsistencies in application across the organization (44 percent), competing priorities (39 percent), and measuring ...