Combining technical and legal expertise
to deliver investigative, discovery and forensic solutions worldwide.

Some of our Features

This is where your latest Features custom posts will show up. You can change this text in the options.

View all our Features
  • Computer Forensics »

    Computer forensics is the use of scientific methodologies for collecting, analyzing, and presenting digital evidence in litigation. The challenge for forensic experts grows as organizations store data on ever-increasing numbers of devices, operating systems and shared platforms. More »

  • Cyber Security »

    Assessments are crucial in determining the effectiveness of an organization’s current security, and in judging whether correct remediation has taken place after an incident. Kivu has deep expertise in both reactive and proactive data security services. More »

  • Data Breach Response »

    In today’s environment, a data breach is the perfect storm. It destroys customer loyalty, ruins corporate reputations, absorbs employee time and scarce resources, and opens the door to regulatory actions and law suits. More »

  • Investigations »

    Fraud, theft of confidential information and employee misconduct are issues which can literally destroy an otherwise sound business. In a highly competitive environment, the risks of financial damage, reputational harm and regulatory action have never been greater. More »

From Our Blog

RSS Kivu Labs

  • Ransomware v2: Facing the Latest Cyber Security Threats October 20, 2016
    A Q&A with Winston Krone of Kivu Consulting – Posted by Mark Greisiger on Junto Blog Oct 2016 There’s no doubt that ransomware attacks are on the rise and they’re becoming more insidious. I spoke with Winston Krone, global managing director of Kivu Consulting about what the latest version of ransomware looks like and what […]
  • Testing Password Encryption Strength June 7, 2016
    Testing the Password Encryption Strength of NT LAN Manager and LAN Manager Hash Security risks associated with weak user-created passwords are well documented. In 2009, for example, cyber security provider Imperva analyzed more than 32 million passwords that were released in a 2009 data breach. More than 50% of the passwords involved poor user password […]

Upcoming Events