Vlog: How Can RCV Protect Your Organization From Social Engineering?

Vlog: How Can Remote Caller Verification Protect Your Organization From Social Engineering?

| | identity management
Mike Engle: Hi, everybody. My name is Mike Engle, co-founder and head of strategy here at 1Kosmos. I’m joined today by Jens Hinrichsen. Say hello, Jens. Jens Hinrichsen: Hello, everybody. Mike Engle: ...

Digital Identity Spotlight: Thailand

| | identity management
The nation of Thailand has a ready response for governments around the world seeking insights on implementing digital identity at scale: Phuket. In recent years, the Thai island paradise of Phuket—long known ...
cybersecurity, identity management

SailPoint Adds Raft of Capabilities to Better Manage Privileges

SailPoint Technologies today added a bevy of capabilities that makes it possible for organizations to manage identities on a more granular level. Announced at the SailPoint Navigate 2024 conference, the company is ...
Security Boulevard
What is Identity Orchestration

What is Identity Orchestration

Identity orchestration is revolutionizing the way businesses handle digital identities, offering a seamless and secure user experience. In this article, we explain the fundamental concepts of identity orchestration, explore its benefits, and ...

Navigating the Complexities of Modern Customer Identity Verification

| | identity management
In an era where identity theft and fraud are rampant, understanding the complexities of customer identity verification is crucial for businesses, especially in the financial sector. This involves meticulous Know Your Customer ...
LoginRadius Launches Identity Orchestration for Seamless Identity Workflows

LoginRadius Launches Identity Orchestration for Seamless Identity Workflows

Managing identity in today's digital world requires innovative solutions. LoginRadius launches Identity Orchestration, a no-code/low-code solution to streamline identity workflows and enhance user experiences. This feature empowers enterprises to easily dynamically build, ...
Securing Cloud Applications: SCIM's Role in Modern Identity Management

Securing Cloud Applications: SCIM’s Role in Modern Identity Management

Uncover SCIM's architecture, detailed workflows, and seamless interaction with SSO. Learn how this powerful protocol standardizes and automates identity management across cloud applications, enhancing security and efficiency ...
OIDC vs SAML: A Comprehensive Technical Comparison

OIDC vs SAML: A Comprehensive Technical Comparison

Dive into the identity and access management world with a technical comparison of OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). This technical guide explores architectures, key differences, and use cases ...

Identiverse 2024: Key Takeaways from the Conference

A few weeks ago, we had the pleasure of attending Identiverse 2024, the premier conference dedicated to identity and security. Now that we’ve had time to reflect, we’re excited to share our ...
Vlog: Defeating Deepfakes

Vlog: Defeating Deepfakes

Join Michael Cichon, CMO at 1Kosmos, and Vikram Subramaniam, VP of Solutions, as they delve into the alarming rise of deepfakes. Discover how this evolving technology threatens security and authentication measures, and ...