Cogito Ergo Sum Blog

Actsmart Business Recycling Program

Cogito Group is recognised as a business that is actively recycling and being environmentally responsible.  We contacted the Actsmart business recycling program to help us reduce costs, reduce impacts on the environment and meet corporate environmental commitments. We...

Microsoft has dumped periodic password expiration policies from its recommended Windows security baseline

This article was originally published on 17 May 2019 by Simon Sharwood for CRN.com.au Microsoft has for years recommended that administrators expire users’ passwords and force them to choose a new one every few weeks. The measure was thought to reduce risk by making...

Cogito and Ionize announce strategic partnership

 Cogito Group and Ionize today announced a strategic partnership that will enable both companies to significantly strengthen the breadth and depth of their cyber security capabilities. Cogito Group and Ionize are both successful Australian cyber security companies...

Five Computer Security Myths, Debunked

This article was first published by Alan Henry on LifeHacker.com on 21 February 2019, and has been adapted for publishing on the Cogito Ergo Sum Blog Some computer security myths and stories that keep getting passed around, even though they're clearly not true. There...

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

Seven Things You Didn’t Know About Jellyfish

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will...

Public Key Infrastructure EXPLAINED

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

All Posts

Cogito and Ionize announce strategic partnership

Cogito and Ionize announce strategic partnership

 Cogito Group and Ionize today announced a strategic partnership that will enable both companies to significantly strengthen the breadth and depth of their cyber security capabilities. Cogito Group and Ionize are both successful Australian cyber security companies...

read more
Five Computer Security Myths, Debunked

Five Computer Security Myths, Debunked

This article was first published by Alan Henry on LifeHacker.com on 21 February 2019, and has been adapted for publishing on the Cogito Ergo Sum Blog Some computer security myths and stories that keep getting passed around, even though they're clearly not true. There...

read more
Cogito Group’s Holiday Wishlist

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

read more
Success in the Australian Technologies Competition

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

read more
A Glance into Indonesia

A Glance into Indonesia

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

read more
Understanding Derived Credentials

Understanding Derived Credentials

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

read more
Seven Things You Didn’t Know About Jellyfish

Seven Things You Didn’t Know About Jellyfish

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

read more
Public Key Infrastructure EXPLAINED

Public Key Infrastructure EXPLAINED

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will...

read more

Six Simple Security Steps to Secure your Information

In the real world... In the real world, physical documents, hand-written signatures, sealed envelopes, photo identifications and established relationships are measures against fraud. Public Key Infrastructure (PKI) translates the trust conventions in the...

read more
Keep cyber safe during the Commonwealth Games

Keep cyber safe during the Commonwealth Games

In February 2018, Cogito Group welcomed Aidan Pond, from Nowra NSW, as a Junior IT Officer as part of our Regional Internship Program. The core value in Cogito Group’s Regional Internship Program is it allows novices to gain real industry insights, whilst...

read more
The 55th National Export Awards

The 55th National Export Awards

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

read more
Peek inside Cogito Group’s new Australian office

Peek inside Cogito Group’s new Australian office

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

read more
Stay Smart Online Week 2017

Stay Smart Online Week 2017

 Cogito Group and Ionize today announced a strategic partnership that will enable both companies to significantly strengthen the breadth and depth of their cyber security capabilities. Cogito Group and Ionize are both successful Australian cyber security companies...

read more

Tell us what you would like to read about

Start a Discussion

6 + 14 =

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you