Syndicated Blog

Identity
Performing strong, verified identity-based authentication for both workers and customers, eliminating the need for passwords, one-time codes, and more.

Distributed Ledger: A Comprehensive Insight for Organizations

| | blockchain
A Distributed Ledger stands at the forefront of modern database technology, a shared database spread across many sites, countries, or institutions. This innovative approach to data management records transactions while ensuring every ...

Distributed Digital Identity: A Transformative Guide for Organizations

|
A new method for controlling and confirming digital identities is emerging: distributed digital identity (DDI). By removing the need for a single authoritative source, DDI empowers users to take charge of their ...

Digital Identity Spotlight: Portugal

| | identity management
Whether it’s Henry the Navigator leading The Age of Discovery or Cristiano Ronaldo nailing a mid-air pirouette on the football field, Portugal has long been home to game-changing innovation—and digital identity is ...
Identity Based Authentication: The Key to Preventing Future MGM-Style Attacks

Identity Based Authentication: The Key to Preventing Future MGM-Style Attacks

| | biometric authentication
Join Rob MacDonald, VP of Product Marketing, and Mike Engle, Co-founder of 1Kosmos, as they discuss the recent cyber attack on MGM and explore the world of vishing (voice phishing) in this ...

MGM, Caesars Hacks: More of the Same Is Coming Your Way–But Here’s How to Stop It

| | Authentication
Given the stunning success of the recent hacks at MGM and Caesars, it’s a safe bet what happened in Vegas won’t stay there for long. Even though technology to prevent such breaches ...

Unmasking the MGM Resorts Cyber Attack: Why Identity-Based Authentication is the Future

| | Authentication
What if the key to your hotel room was suddenly useless, and your personal information was floating in the digital ether? This happened after the recent MGM Resorts cyberattack; the vulnerabilities in ...

Demystifying Passkeys: A Future of Passwordless Authentication

| | Authentication
In the ever-evolving landscape of cybersecurity, it’s crucial to stay up to date with the latest innovations and technologies designed to enhance online security. One such innovation that has gained significant traction ...

Defending Your Online Presence: Identity-Based Passwordless Authentication

| | Authentication
Introduction Traditional password-based authentication techniques are vulnerable to online attacks. Fortunately, a ground-breaking remedy called an identity-based passwordless authentication system is on the horizon. Let’s explore how passwordless authentication works. We’ll discuss ...

Understanding eKYC: An In-Depth Overview

| | identity management
Introduction Have you ever considered how identity verification is handled? Do not look other than eKYC. The complexity of eKYC will be unlocked with this article. Join us as we dive deep ...
Inserting Identity into Your SSO Implementation

Inserting Identity into Your SSO Implementation

| | identity management
In this vlog, 1Kosmos VP of Product Marketing, Robert MacDonald, is joined by the VP of Solutions, Vikram Subramanian to discuss inserting identity into your SSO implementation. Robert MacDonald: Hi, everybody. Welcome ...