Cognitio Cognitio brings experience in all facets of data science from collection, normalization, analytics and deriving fast and unqiue insights to help decision-makers have the right information at the right time
About Us - cognitiocorp. com Cognitio is an engineering firm established and managed by a team of former senior technology executives from the U S Intelligence Community Our team remains committed to National Security and serving our country and clients’ missions with the best people, solutions and innovation combined
Careers - Cognitio Resumes submitted to any Cognitio employee by a third-party agency and or search firm will become the sole property of Cognitio, and no search fee will be paid if a candidate is hired for a position because of an unsolicited agency or search firm referral
Defense in Depth: Protecting the Organization’s Data - Cognitio Editor’s note: in this post, Cognitio’s Marty Meehan provides context on an economical, scalable and highly secure defense in depth solution leveraging PKWARE’s Smartcrypt and QuintessenceLabs – bg
The State of Digital Currency: A discussion with Ed Scheidt - Cognitio Roger Hockenberry A few weeks ago I had the pleasure of sitting down for a regular breakfast with Ed Scheidt, former head of CIA’s Cryptographic Center and the designer of the cyrpto systems used in the Kryptos Sculpture at the Agency He and I get together and typically it’s a free-ranging discussion that covers a …
At The Gartner Security and Risk Management Summit: How to Stop . . . Join Bob Flores, Executive Partner of Cognitio, and Junaid Islam, CTO of Vidder, Inc, at the Gartner Security Risk Management Summit for their session on How to Stop Catastrophic Cyber Failure in Your Organization
Moving Toward a Framework for Resilient Cybersecurity: Orchestrating . . . This post was written by Cognitio and sponsored by Verisign In the previous blog posts, we highlighted the role that threat intelligence plays in the development of a framework for resilient cybersecurity, as well as the importance of a solutions based approach when it comes to security tool selection