identity management

Vlog: How Can Remote Caller Verification Protect Your Organization From Social Engineering?
Mike Engle: Hi, everybody. My name is Mike Engle, co-founder and head of strategy here at 1Kosmos. I’m joined today by Jens Hinrichsen. Say hello, Jens. Jens Hinrichsen: Hello, everybody. Mike Engle: ...
Digital Identity Spotlight: Thailand
The nation of Thailand has a ready response for governments around the world seeking insights on implementing digital identity at scale: Phuket. In recent years, the Thai island paradise of Phuket—long known ...

SailPoint Adds Raft of Capabilities to Better Manage Privileges
SailPoint Technologies today added a bevy of capabilities that makes it possible for organizations to manage identities on a more granular level. Announced at the SailPoint Navigate 2024 conference, the company is ...

What is Identity Orchestration
Identity orchestration is revolutionizing the way businesses handle digital identities, offering a seamless and secure user experience. In this article, we explain the fundamental concepts of identity orchestration, explore its benefits, and ...
Navigating the Complexities of Modern Customer Identity Verification
In an era where identity theft and fraud are rampant, understanding the complexities of customer identity verification is crucial for businesses, especially in the financial sector. This involves meticulous Know Your Customer ...

LoginRadius Launches Identity Orchestration for Seamless Identity Workflows
Managing identity in today's digital world requires innovative solutions. LoginRadius launches Identity Orchestration, a no-code/low-code solution to streamline identity workflows and enhance user experiences. This feature empowers enterprises to easily dynamically build, ...

Securing Cloud Applications: SCIM’s Role in Modern Identity Management
Uncover SCIM's architecture, detailed workflows, and seamless interaction with SSO. Learn how this powerful protocol standardizes and automates identity management across cloud applications, enhancing security and efficiency ...

OIDC vs SAML: A Comprehensive Technical Comparison
Dive into the identity and access management world with a technical comparison of OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). This technical guide explores architectures, key differences, and use cases ...
Identiverse 2024: Key Takeaways from the Conference
A few weeks ago, we had the pleasure of attending Identiverse 2024, the premier conference dedicated to identity and security. Now that we’ve had time to reflect, we’re excited to share our ...

Vlog: Defeating Deepfakes
Join Michael Cichon, CMO at 1Kosmos, and Vikram Subramaniam, VP of Solutions, as they delve into the alarming rise of deepfakes. Discover how this evolving technology threatens security and authentication measures, and ...