Cogito Ergo Sum Blog

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

Seven Things You Didn’t Know About Jellyfish

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will...

Public Key Infrastructure EXPLAINED

In the real world... In the real world, physical documents, hand-written signatures, sealed envelopes, photo identifications and established relationships are measures against fraud. Public Key Infrastructure (PKI) translates the trust conventions in the...

Six Simple Security Steps to Secure your Information

Protecting online resources and information is time consuming, arduous and (let's face it) boring. But individual users, businesses and their employees can all takes small steps in their daily actions to solve information security concerns on a larger...

Celebrating 25 years of Australian Innovation at the 2018 iAwards

The iAwards are in their 25th year of promoting excellence in the Australian digital ecosystem, throughout those 25 years they have become Australia's longest running and and most broadly scoped innovation recognition program.The iAwards unearth, recognise...

Ten Essential Activities to Protect Information, Systems and Networks in Small to Medium Enterprises

With over 2 million Small to Medium Enterprises (SMEs) operating in Australia, SMEs account for 97 per cent of all businesses in the nation (Commonwealth of Australia, 2016). SMEs play a central role in the Australian economy, making an immense contribution to the...

Largest Ever Delegation of Australian Cyber Security Companies make the trip to North America

  Austrade, in partnership with AustCyber, the Australian State and Territory Governments, and Data61, organised the 2018 Australian Cyber Security Mission to USA. The purpose of the mission was to build relationships with leading cyber security,...

All Posts

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

read more

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

read more

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

read more

Seven Things You Didn’t Know About Jellyfish

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will...

read more

Public Key Infrastructure EXPLAINED

In the real world... In the real world, physical documents, hand-written signatures, sealed envelopes, photo identifications and established relationships are measures against fraud. Public Key Infrastructure (PKI) translates the trust conventions in the...

read more

Six Simple Security Steps to Secure your Information

Protecting online resources and information is time consuming, arduous and (let's face it) boring. But individual users, businesses and their employees can all takes small steps in their daily actions to solve information security concerns on a larger...

read more

Tell us what you would like to read about