LoginRadius Launches Identity Orchestration for Seamless Identity Workflows

LoginRadius Launches Identity Orchestration for Seamless Identity Workflows

Managing identity in today's digital world requires innovative solutions. LoginRadius launches Identity Orchestration, a no-code/low-code solution to streamline identity workflows and enhance user experiences. This feature empowers enterprises to easily dynamically build, ...
Securing Cloud Applications: SCIM's Role in Modern Identity Management

Securing Cloud Applications: SCIM’s Role in Modern Identity Management

Uncover SCIM's architecture, detailed workflows, and seamless interaction with SSO. Learn how this powerful protocol standardizes and automates identity management across cloud applications, enhancing security and efficiency ...
OIDC vs SAML: A Comprehensive Technical Comparison

OIDC vs SAML: A Comprehensive Technical Comparison

Dive into the identity and access management world with a technical comparison of OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). This technical guide explores architectures, key differences, and use cases ...

Identiverse 2024: Key Takeaways from the Conference

A few weeks ago, we had the pleasure of attending Identiverse 2024, the premier conference dedicated to identity and security. Now that we’ve had time to reflect, we’re excited to share our ...
Vlog: Defeating Deepfakes

Vlog: Defeating Deepfakes

Join Michael Cichon, CMO at 1Kosmos, and Vikram Subramaniam, VP of Solutions, as they delve into the alarming rise of deepfakes. Discover how this evolving technology threatens security and authentication measures, and ...

Elevating Government Digital Transformation with an Advanced Credential Service Provider – 1Kosmos

As a leading provider of identity management solutions, 1Kosmos is excited to announce our new capability as a Credential Service Provider (CSP) for government agencies. This development represents a significant step forward ...
Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Identities face relentless threats, with attackers often outpacing defenders in speed. Their rapid tactics give them a breakout time of 84 minutes (according to CrowdStrike’s 2024 Global Threat Report1), making the fallout ...
Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based ...

10 Takeaways from the 2024 Gartner IAM Summit UK  

I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...
How Does Multi-Tenancy in Customer IAM Solutions Boost Security?

How Does Multi-Tenancy in Customer IAM Solutions Boost Security?

Multi-tenancy in Customer IAM architecture introduces a significant shift in how organizations manage and protect their users' identities in a shared environment. Let's discover how multi-tenancy enables multiple tenants or customers to ...

Application Security Check Up