Articles & Abstracts
Cyb(h)er Series

Cyb(h)er: Interview with Alicia Putrino

An interview with Alicia Putrino, CISO at McGraw Hill, on cybersecurity in the educational sector

Filter by:
Showing 1 - 12 of 25
  • Resources
    Changing Face of Cyber Claims Report

    Clive Cully, UK Director joined experts from Marsh and Microsoft for a webinar discussing the Changing Face of Cyber Claims report, which provided insights into managing and mitigating cyber risk and claims.

  • Blog
    OFAC Advisories Highlight Risks in Paying Ransoms

    The FinCEN and OFAC advisories offer a warning to all those providing ransomware response services or insurance coverage for ransomware payments.

  • Blog
    Cyber Extortion & Ransomware

    Kivu has built an industry leading reputation combating cyber extortion and responding to cyber-crime, enabling our clients to make informed, cost-effective decisions

  • Blog
    Cyb(h)er: Interview with Alicia Putrino (EP1)

    Gain interesting insight into the educational sector and advice on how to better ourselves within the realm of cyber.

  • Blog
    Ransomware: Where We Are Now

    Ransomware is now one of the fastest-growing threats in cybersecurity that is ever-evolving. With attacks that are more aggressive and diverse than ever before. Threat actors are constantly improving with the use of multiple attack vectors.

  • Blog
    Introducing Our Managed Security Services

    With Kivu’s MSS product organizations leverage a trusted team of experts to help prevent, detect, respond to and hunt for threats in their environment.

  • Blog
    Safeguarding data, encryption, tokenization and hashing

    Encryption is a best practice that helps safeguard private data “at rest” (in the database). However, most companies don’t deploy encryption.

  • Blog
    Cyber Insurance & Ransomware

    When an organization responds to a successful ransomware attack without outside assistance, it’s dueling with an adversary that’s already outwitted it technically, and is probably many times more experienced extracting the maximum ransom amounts from its victims.

  • Blog
    Kivu Coffee Break: Attack Vectors: How to Prevent an Infiltration?

    Conversation about the main attack vectors, how they infiltrate networks, and what protective measures to take for your company.

  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Learn the methods that threat actors use to breach or infiltrate their victims’ network and how to protect your company.

  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Threat actors use many different methods to breach or infiltrate their victims’ network. These methods are known as attack vectors.

  • Blog
    Kivu Coffee Break: Holiday Cyber Security Tips

    Natalie Fioravanti and Nicholas P. R. Steinmann provide us with tips to stay safe online this holiday season.


Contact Us

See something of interest? Reach out and we would be happy to discuss opportunities with your you.