Combining technical and legal expertise
to deliver investigative, discovery and forensic solutions worldwide.

Some of our Features

This is where your latest Features custom posts will show up. You can change this text in the options.

View all our Features
  • Computer Forensics »

    Computer forensics is the use of scientific methodologies for collecting, analyzing, and presenting digital evidence in litigation. The challenge for forensic experts grows as organizations store data on ever-increasing numbers of devices, operating systems and shared platforms. More »

  • eDiscovery »

    The nature of electronically stored information (ESI) has evolved. Modern ESI no longer consists of just simple Microsoft documents and Outlook email. Instead, relevant data is increasingly found in databases, cloud storage, social media and diverse non-Windows file and email formats. More »

  • Data Breach Response »

    In today’s environment, a data breach is the perfect storm. It destroys customer loyalty, ruins corporate reputations, absorbs employee time and scarce resources, and opens the door to regulatory actions and law suits. More »

  • Investigations »

    Fraud, theft of confidential information and employee misconduct are issues which can literally destroy an otherwise sound business. In a highly competitive environment, the risks of financial damage, reputational harm and regulatory action have never been greater. More »

From Our Blog

RSS Kivu Labs

  • Identifying the Presence of Encryption February 7, 2015
    In yet another laptop data breach incident, Riverside County Regional Medical Center in Riverside, California reported that a lost laptop containing Personally Identifiable Information (“PII”) and Protected Health Information (“PHI”) for about 7,900 patients went missing in December 2014. According to a letter filed with the California State Attorney General, potentially exposed PII and PHI […]
  • Malware Trends for 2015 and What Companies Can Do February 5, 2015
    Within the past year, Kivu has seen several malware trends emerging, including exploitation in widely used software applications (Heartbleed, Bash, and Shellshock), cycles of ransomware and destructive malware (Master boot wiper, HD wiper), and an increase of rootkits, botnets and traditional drive-by malware. In 2015, we expect to see new malware trends, including an increase […]

Upcoming Events