COGITO BLOG

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large. Cloud-based business solutions have become popular for offering less expense, less downtime, and often more security, with a...

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

Iranian Spear-Phishing Attacks Escalate amid Rising Tensions with U.S.

Recent reports of spear-phishing emails targeted at U.S Government agencies have fed into fears that offensive Iranian cyber-attacks could be increasing amid rising tensions between the Middle-Eastern country and the U.S. Earlier this month the Trump administration...

The Biggest Mistakes Businesses Make Using PKI

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

How to find and fix Vulnerable Certificates in your Network

1 in 5 unique IP addresses are still using the vulnerable SHA-1 certificate, according to research by machine identity protection agency Venafi.   There are multiples issues SSL certificates can be exposed to, including vulnerabilities from attacks like POODLE or...

The Biggest Mistakes Businesses Make Using PKI

With the pervasive evolution of the IoT at our doorstep, PKI has become one of the fastest-growing cyber-security tactics in business and government today. PKI is used to create, manage, distribute, use, store and revoke digital certificates. The visible management of...

Pros and Cons of Azure

Microsoft Azure is a cloud-based storage solution designed for ease-of-access management for organisations that scale from small to large.  There are several major players in cloud-storage solutions, Microsoft’s Azure is one of the largest. Like everything else, Azure...

PKI – The Pros and Cons

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

Office 365 – The Good, the Bad, the Ugly

Microsoft Office 365 is a cloud-based application used by many organisations and individuals to help streamline workflows and allow for team collaboration. For organisations in the digital age, every application has its upsides and its downsides. Cons of Office 365:...

How to Combat the Cost of Cloud Computing for SME’s

You know Cloud Computing is too expensive when even Mark Zuckerberg complains about it. "In our bio board meetings, one of the things we talk about is the cost of the compute, and our AWS bill, for example, is one of the specific points.” He stated. According to...

All Posts

A Glance into Indonesia

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

read more
Understanding Derived Credentials

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

read more
Seven Things You Didn’t Know About Jellyfish

Seven Things You Didn’t Know About Jellyfish

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will...

read more

Six Simple Security Steps to Secure your Information

Protecting online resources and information is time consuming, arduous and (let’s face it) boring. But individual users, businesses and their employees can all takes small steps in their daily actions to solve information security concerns on a larger scale. Although...

read more
Cogito Group sponsor athlete to compete at Commonwealth Games

Cogito Group sponsor athlete to compete at Commonwealth Games

At Cogito Group, we understand the time and commitment it takes to achieve success. Passion is a key ingredient to accomplishing our goals and at Cogito Group we are not only passionate about our work in the IT industry, but also passionate about helping others...

read more
Keep cyber safe during the Commonwealth Games

Keep cyber safe during the Commonwealth Games

The countdown to the Commonwealth Games is on! Major sporting events like the Commonwealth Games draw attention from around the world and can be a prime target for cyber criminals.  There is likely to be an increase in scams and cybercrime related to the Commonwealth...

read more
The 55th National Export Awards

The 55th National Export Awards

The 55th Australian Export Awards took place in Canberra on 5th December 2017. Before the ceremony Cogito Group enjoyed a National Finalists’ Masterclass at Kurrajong Hotel.  This included a keynote presentation by Dr Michael Rosemann, Executive Director from QUT.  He...

read more
Peek inside Cogito Group’s new Australian office

Peek inside Cogito Group’s new Australian office

The Canberra office of Cogito Group have moved into their new premises at 9 Sydney Ave, Barton. From our humble beginnings in the garage at Weetangera, to the local shops in Hawker, we are now in the heart of Canberra just a stone’s throw from Parliament House. The...

read more
Stay Smart Online Week 2017

Stay Smart Online Week 2017

Cogito Group is encouraging Australians to make internet safety a top priority, partnering with Stay Smart Online to promote Stay Smart Online Week – a national awareness initiative dedicated to boosting Australia’s cyber resilience. For most of us, the internet opens...

read more
Cogito Group takes out Business Services award at Export Awards

Cogito Group takes out Business Services award at Export Awards

Cogito Group was named winner of the ACT Export Awards in the Business Services category. The ACT Chief Minister’s Export Awards were held at The National Portrait Gallery last night.  The awards recognise the innovation, hard work and success of businesses, large and...

read more
Cogito Group finalists in Export Awards

Cogito Group finalists in Export Awards

The ACT Chief Minister's Export Awards finalists announcement was made on 30 August 2017 at East Hotel. The Export Awards are about recognising and celebrating organisations achievements. It also helps project Canberra's credentials internationally.  ACT Chief...

read more
Australian Trade Mission to Singapore

Australian Trade Mission to Singapore

During the fourth week in August, Cogito Group attended a trade mission to Singapore organised by Austrade. The mission was joined by the Australian Minister for Trade, Tourism and Investment, The Hon Steven Ciobo MP aswell as The Minister for Defence, Senator The Hon...

read more
Richard Brown features in the APAC CIO Outlook magazine

Richard Brown features in the APAC CIO Outlook magazine

Cogito Group's Managing Director, Richard Brown, was interviewed by APAC CIO Outlook. He was asked to speak about how to safeguard Organisations with Cloud security services. Richard explains about our product Jellyfish and how it solves the problems that we see...

read more
Q & A with Richard Brown and Versasec

Q & A with Richard Brown and Versasec

Cogito Group are partners with Versasec and were asked to contribute to their quarterly partner blog series. Richard Brown, Managing Director of Cogito Group, discusses the benefits of protecting corporate data from cyber-intruders via two-factor identification.  The...

read more

Tell us what you would like to read about

REQUEST A SOLUTION

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you