Cogito Ergo Sum Blog

Five Computer Security Myths, Debunked

This article was first published by Alan Henry on LifeHacker.com on 21 February 2019, and has been adapted for publishing on the Cogito Ergo Sum Blog Some computer security myths and stories that keep getting passed around, even though they're clearly not true. There...

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

Seven Things You Didn’t Know About Jellyfish

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will...

Public Key Infrastructure EXPLAINED

In the real world... In the real world, physical documents, hand-written signatures, sealed envelopes, photo identifications and established relationships are measures against fraud. Public Key Infrastructure (PKI) translates the trust conventions in the...

Six Simple Security Steps to Secure your Information

Protecting online resources and information is time consuming, arduous and (let's face it) boring. But individual users, businesses and their employees can all takes small steps in their daily actions to solve information security concerns on a larger...

Celebrating 25 years of Australian Innovation at the 2018 iAwards

The iAwards are in their 25th year of promoting excellence in the Australian digital ecosystem, throughout those 25 years they have become Australia's longest running and and most broadly scoped innovation recognition program.The iAwards unearth, recognise...

Ten Essential Activities to Protect Information, Systems and Networks in Small to Medium Enterprises

With over 2 million Small to Medium Enterprises (SMEs) operating in Australia, SMEs account for 97 per cent of all businesses in the nation (Commonwealth of Australia, 2016). SMEs play a central role in the Australian economy, making an immense contribution to the...

All Posts

Richard Brown features in the APAC CIO Outlook magazine

Cogito Group's Managing Director, Richard Brown, was interviewed by APAC CIO Outlook. He was asked to speak about how to safeguard Organisations with Cloud security services. Richard explains about our product Jellyfish and how it solves the problems that we see...

read more

Q & A with Richard Brown and Versasec

Cogito Group are partners with Versasec and were asked to contribute to their quarterly partner blog series. Richard Brown, Managing Director of Cogito Group, discusses the benefits of protecting corporate data from cyber-intruders via two-factor identification.  The...

read more

Petya. Another WannaCry WannaBe

Petya has arrived.  Petya is a new infection exploiting the same issue as WannaCry.  It has attacked computers around the world including servers at Russia's biggest oil company and disrupting operations at Ukranian banks. There have been reports that companies in...

read more

Cogito Group wins at iAwards

The ACT iAwards were held at QT Canberra on Wednesday 31 May 2017.  The AIIA’s iAwards honours both companies at the cutting edge of technology innovation as well as leading professionals across the Digital Economy. Most importantly, the iAwards recognises the...

read more

Jellyfish videos

Jellyfish is an innovative cyber security platform that brings a unified approach to security by aggregating security services and products. Cogito Group have been working on new videos which will explain our product Jellyfish. These videos will provide you with an...

read more

Australian Cyber Security Mission to San Francisco

Austrade USA organised an Australian Cyber Security Mission to San Francisco in February 2017.  Cogito Group were honoured to be part of the delegation representing Australia. The purpose of this trip was to showcase Australia’s world-class cyber security capabilities...

read more

Jellyfish®

Jellyfish® is an innovative cyber security platform that brings a unified approach to security by aggregating security services and products – providing full credential management with identity and access management. This means organisations can make better access...

read more

Australian Cyber Security Mission to India

From 21 – 24 November 2016, Cogito Group were part of a delegation that attended the Cyber Security Mission to India. The mission, organised by Austrade India, focused on yielding commercial outcomes for participants through direct engagement with senior...

read more

The 54th Australian Export Awards

Last night Cogito Group attended the 54th Australian Export Awards, held in Brisbane at the Royal International Convention Centre. The Australian Export Awards, co-presented by Austrade, The Australian Chamber of Commerce and Industry and CPA Australia, are recognised...

read more

We’re exhibiting at MilCIS 2016

From the 8th to the 11th of November 2016, Cogito Group will be exhibiting at the Military Communication and Information Systems Conference (MilCIS). MilCIS is a unique opportunity for those investing in government and military communications and information systems....

read more

Ensuring trusted access for a connected and evolving world

This morning Cogito Group partnered with Entrust Datacard to bring an informative session focusing on ensuring trusted access for a connected and evolving world. Held at the Hotel Realm in Canberra, the three speakers explored different areas of trusted access....

read more

Cogito Group wins at Export Awards

Last night at Pialligo Estate, Cogito Group attended the ACT Chief Minister's Export Awards. These awards celebrate the Canberra Region companies who are doing great business outside of Australia. Cogito Group were honoured to be finalists in four categories: Small...

read more

Join us for Breakfast

Cogito Group along with Entrust Datacard are hosting a breakfast on Tuesday 25th October 2016 at Hotel Realm in Canberra. The morning will be focused on ensuring trusted access for a connected and evolving world. Richard Brown, Managing Director of Cogito Group will...

read more

Finalists in the ACT Export Awards

On Wednesday 14th September 2016, at Vibe Hotel in Canberra, Cogito Group were nominated as finalists in four categories in the 2016 ACT Chief Minister’s Export Awards. The categories are: Small Business Digital Technologies Business Services, and Exporting Government...

read more

Cogito Group to chair ADM summit 2016

On Wednesday 22 June 2016, Richard Brown will chair day 2 of the Australian Defence Magazine’s Cyber Security Summit 2016. This Summit explores Cyber warfare prevention across 3 core themes: Policy, Intelligence and Compliance. In the current climate, a sophisticated...

read more

Australia’s Cyber Security Strategy released

On Thursday 21 April 2016, the Australian Government released Australia's Cyber Security Strategy. The Cyber Security Strategy sets out the Australian Government’s philosophy and program for meeting the dual challenges of the digital age—advancing and protecting...

read more

Visit us at booth 65

Cogito Group are proud to be exhibiting at the Australian Cyber Security Centre (ACSC) 2016 Conference on 12 - 14 April 2016. The ACSC Conference will bring cyber security experts from Australia and abroad to discuss the latest trends, mitigations and advances in...

read more

A successful AIIA summit

On Tuesday 8th March 2016, Cogito Group were proud sponsors of the Australian Information Industry Association (AIIA) Navigating Privacy and Security Summit. Click here to read our last post about the Summit. Held at the National Convention Centre in Canberra, Cogito...

read more

Cogito Group panelist at AIIA Summit

Cogito Group is proud to be a sponsor of Australian Information Industry Association's (AIIA) Navigating Privacy and Security Summit to be held on 8 March 2016 in Canberra. The Summit is bringing innovative ICT industry players together with State and Federal...

read more

Defence and cyber security: An SME’s perspective

In the recent edition of Australian Defence Magazines 'Defence Week' Richard Brown, CEO of Cogito Group was interviewed to get his perspective on the Prime Minister's announcement of a new Cyber Dialogue during his visit to the US and the recent release which paints a...

read more

Australian Govt ‘Data Breach Notification’ Draft Bill

The Australian Government is inviting public comment on its ‘data breach notification’ bill before legislation is introduced in Parliament in 2016. The Bill would require Government agencies and businesses subject to the Privacy Act 1988 to notify the national privacy...

read more

Tell us what you would like to read about

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you!