Five Computer Security Myths, Debunked

Five Computer Security Myths, Debunked

This article was first published by Alan Henry on LifeHacker.com on 21 February 2019, and has been adapted for publishing on the Cogito Ergo Sum Blog Some computer security myths and stories that keep getting passed around, even though they’re clearly not true....
Cogito Group’s Holiday Wishlist

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...
A Glance into Indonesia

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form – Indonesia’s biggest Defence Industry event. IndoDefence, hosted by the...
Understanding Derived Credentials

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...