Syndicated Blog

Identity
Performing strong, verified identity-based authentication for both workers and customers, eliminating the need for passwords, one-time codes, and more.

What Is Federated Identity? How It Works & Why

| | identity management
What Is Federated Identity? Federated identity refers to linking a person’s electronic identity and attributes stored across multiple identity management systems. These systems use common protocols and communication standards to securely link ...

Identity Lifecycle Management (ILM) Explained

Identity-related security is paramount in our modern threat landscape, touching on almost any form of vulnerability related to cybersecurity. What Is Identity Lifecycle Management? Identity Lifecycle Management (ILM) is the collection of ...
Overcoming Resistance to Change on the Journey to Passwordless MFA

Vlog: Overcoming Resistance to Change on the Journey to Passwordless MFA

| | Authentication
Join Michael Cichon, CMO of 1Kosmos, and Mike Engle, CSO, as they discuss the journey to passwordless multifactor authentication in their insightful vlog. Discover the nuances between the passwordless feature and implementing ...

Digital Identity Spotlight: Belgium

It shouldn’t be a surprise that Belgium ranks among the vanguards of digital identity. The digital world as we know it may never have existed without this tiny northwestern European country of ...

A Celebration of Pride Month: Embracing Inclusive Identity Proofing and Authentication

Pride month is a time when we celebrate the diversity of human identity and recognize the importance of embracing and honoring individuals for who they truly are. It is a reminder that ...

What Is Account Takeover Prevention? Preventing ATO Fraud

Account takeover prevention actively reduces attack surfaces by which hackers can break into and use system accounts for malicious purposes. What Is an Account Takeover Attack? Account takeover (ATO) refers to identity ...

LinkedIn’s ID Verification – One Small Step in the Right Direction

LinkedIn has joined the ranks of social media platforms offering ID verification badges designed to assure users that the person associated with a profile is in fact who they claim to be ...

Verizon Data Breach Investigations Report 2023

| | Authentication
Last week, Verizon released its Data Breach Investigations Report (DBIR). In this 16th year of the report, Verizon highlighted their analysis of more than 953,894 incidents, of which 254,968 are a breach ...

What Is Windows Credential Manager & How Does It Work?

| | identity management
What Is Windows Credential Manager & How Does It Work? Windows Credential Manager is Windows software that stores authentication credentials that are used to log in to websites or other computers on ...

What Are Login Credentials?

| | Authentication
What Are Login Credentials? Login credentials are unique pieces of information that verify the identity of a user accessing a digital system. How Do Login Credentials Work? The functionality of login credentials ...