Combining technical and legal expertise
to deliver investigative, discovery and forensic solutions worldwide.

Some of our Features

This is where your latest Features custom posts will show up. You can change this text in the options.

View all our Features
  • Computer Forensics »

    Computer forensics is the use of scientific methodologies for collecting, analyzing, and presenting digital evidence in litigation. The challenge for forensic experts grows as organizations store data on ever-increasing numbers of devices, operating systems and shared platforms. More »

  • Cyber Security »

    Assessments are crucial in determining the effectiveness of an organization’s current security, and in judging whether correct remediation has taken place after an incident. Kivu has deep expertise in both reactive and proactive data security services. More »

  • Data Breach Response »

    In today’s environment, a data breach is the perfect storm. It destroys customer loyalty, ruins corporate reputations, absorbs employee time and scarce resources, and opens the door to regulatory actions and law suits. More »

  • Cyber Extortion »

    The Internet has become the main battleground for sophisticated criminals, extortionists, and foreign agents.  Kivu has developed an expertise in cyber extortion and responding to cyber-crime, including analysts fluent in Russian, Chinese, and Spanish.   More »

From Our Blog

RSS Kivu Labs

  • Protecting Your Company From a Cybersecurity Meltdown (or Spectre) February 23, 2018
    The following blog was written and posted by Willis Towers Watson, February 22, 2018. The latest threat to cybersecurity isn’t a new form of ransomware — it’s a pair of hardware bugs that have the ability to impact virtually any device that has a chip in it – including servers, desktops and mobile devices. These infiltrators, […]
  • Spotlight on Ransomware: Recent Trends January 15, 2018
    Kivu rounded out the calendar year with a holiday season bursting with ransomware attacks. Here’s the good, the bad and the ugly on what we’re seeing in recent attacks (really just the bad and the ugly). Extension-Agnostic Ransomware Traditionally, ransomware encrypts files based on their file extensions. Most ransomware contains source code with a list […]

Upcoming Events

UA-97613896-1