About us
At Cognitio Digital we don’t try to do it all, or be everything to everybody. We do what we do well, and we do what we love: we deliver cyber resilience and data insights through people and technology!! In an era where cyber threats are becoming increasingly sophisticated, securing your organisation’s digital assets and data, your sensitive commercial know-how and customer information is not just an option; it is an absolute necessity. We help you prepare, ensuring you have a comprehensive plan, supported by the necessary systems and processes tailored to your unique context, enabling you to have confidence in your defences and respond rapidly to any emerging cybersecurity issue or incident. Our depth is in the complex, sensitive and protected environments of Government, Health and the Defence Sector, as well as Financial Services and the Resources industry. We bring industrialised know-how, tools and the Cognitio mindset - which means that we're as committed to your digital future as you are - to every transformation!
- Website
-
https://www.cognitio.digital/
External link for Cognitio Digital
- Industry
- Technology, Information and Internet
- Company size
- 11-50 employees
- Headquarters
- Brisbane
- Type
- Privately Held
- Specialties
- cybersecurity, data, analytics, digital native, and artificial intelligence
Locations
-
Primary
Brisbane, AU
Employees at Cognitio Digital
Updates
-
We think this is quite a good summary of some of the biggest issues out there around #identity security... which continues to be one of the biggest issues in #cybersecurity: "The identity crisis is not a distant threat—it’s here, and it’s growing. Cybercriminals are exploiting trusted platforms, automating their attacks, and targeting IAM systems with devastating precision. For cybersecurity professionals, the path forward is clear: adopt phishing-resistant MFA, enforce Zero Trust principles, and reimagine IAM as both a security tool and a critical business enabler." https://lnkd.in/gFajjFZP
-
Hacking licence plates... fascinating! https://lnkd.in/gyF4Ntzm
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets
wired.com
-
We all store, process and transmit SO much data in collaboration and office productivity suites... which is why directives like these (and their equivalent in Australia - e.g. the Protective Security Policy Framework mandating Essential 8 maturity level 2 compliance) are so important. This quote from CISA says it all: "Recent cybersecurity incidents highlight the significant risks posed by misconfigurations and weak security controls, which attackers can use to gain unauthorized access, exfiltrate data, or disrupt services," https://lnkd.in/dEFmdXNn
CISA orders federal agencies to secure Microsoft 365 tenants
bleepingcomputer.com
-
Some folk may see the False Claims Act and it's enforcement in relation to #cybersecurity as a form of #insiderthreat... others may see it as analogous to a bug bounty / responsible disclosure program run by the central government. It's not really either, but whatever it is, at least from the perspective of the US authorities, it seems to be somewhat effective.... Not bad for a law that dates back to the mid-1800s! https://lnkd.in/dCqc5e9N
In IT? Need cash? Cybersecurity whistleblowers are earning big payouts.
arstechnica.com
-
Can our human eye really detect #deepfakes? The #ai algorithms that generate synthetic images and videos are getting better by the day... by the hour in fact... But there are still (sometimes) some giveaways if you know what to look for... Can you spot them in this test from Kellogg Northwestern University? We recommend doing at least 10 of the comparison tests and would love to hear your scores in the comments below 👇 👇 👇 https://lnkd.in/eqUbvUVf
AI-generated or Real?
detectfakes.kellogg.northwestern.edu
-
#Insiderthreat. If you're in #cybersecurity and haven't read the indictments the US has made against the folk involved in this campaign to create insider threats in American industry, then you should. And when you do, most people's immediate reaction is 'how do we know it isn't happening in my backyard too?'... Perhaps unsurprisingly, it turns out that it is! https://lnkd.in/gefkAAKK
North Korean IT workers ‘have infiltrated Australian businesses’, experts warn
smh.com.au
-
It's not just the length of the campaign, it's the efforts the threat group made to obfuscate and hide their efforts that make this a sophisticated (and clearly very effective) supply chain attack.... https://lnkd.in/gP8UjKgY
Yearlong supply-chain attack targeting security pros steals 390K credentials
arstechnica.com
-
Sometimes, all you can say is #wow! "Willow can perform a standard benchmark calculation in less than five minutes. One of the fastest supercomputers currently in existence would need ten quadrillion (10 to the power of 25) years to do the same" https://lnkd.in/gRG-vyZv
Google claims quantum leap with new Willow chip
cio.com
-
Very few #cyberprofessionals believe the CVSS framework to be flawless... but it's still the most widely used vulnerability management model in existence, and no matter how one looks at it, there are challenges and tradeoffs in every other approach too. But this latest research suggests the issues might be deeper than previously thought... https://lnkd.in/ge9wr8UK
Security researchers find deep flaws in CVSS vulnerability scoring system
csoonline.com