Insights

Articles & Abstracts
Cyb(HER) Series

Cyb(HER): Interview with Phyllis Sumner

An interview with Phyllis Sumner, Chief Privacy Officer, and Data, Privacy, and Security Practice Leader at King & Spalding

Filter by:
Showing 13 - 24 of 35
  • Blog
    Cyber Extortion & Ransomware

    Kivu has built an industry leading reputation combating cyber extortion and responding to cyber-crime, enabling our clients to make informed, cost-effective decisions

  • Blog
    Cyb(h)er: Interview with Alicia Putrino (EP1)

    Gain interesting insight into the educational sector and advice on how to better ourselves within the realm of cyber.

  • Blog
    Ransomware: Where We Are Now

    Ransomware is now one of the fastest-growing threats in cybersecurity that is ever-evolving. With attacks that are more aggressive and diverse than ever before. Threat actors are constantly improving with the use of multiple attack vectors.

  • Blog
    Introducing Our Managed Security Services

    With Kivu’s MSS product organizations leverage a trusted team of experts to help prevent, detect, respond to and hunt for threats in their environment.

  • Blog
    Safeguarding data, encryption, tokenization and hashing

    Encryption is a best practice that helps safeguard private data “at rest” (in the database). However, most companies don’t deploy encryption.

  • Blog
    Cyber Insurance & Ransomware

    When an organization responds to a successful ransomware attack without outside assistance, it’s dueling with an adversary that’s already outwitted it technically, and is probably many times more experienced extracting the maximum ransom amounts from its victims.

  • Blog
    Kivu Coffee Break: Attack Vectors: How to Prevent an Infiltration?

    Conversation about the main attack vectors, how they infiltrate networks, and what protective measures to take for your company.

  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Learn the methods that threat actors use to breach or infiltrate their victims’ network and how to protect your company.

  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Threat actors use many different methods to breach or infiltrate their victims’ network. These methods are known as attack vectors.

  • Blog
    Kivu Coffee Break: Holiday Cyber Security Tips

    Natalie Fioravanti and Nicholas P. R. Steinmann provide us with tips to stay safe online this holiday season.

  • Blog
    Cyber Tips for the Holiday Season

    Learn tips to keep you and your information safe while holiday shopping and finding the cyber deal this holiday season.

  • Blog
    Ten Common Computer Security Misconfigurations & What to Avoid

    Kivu consulting has identified the top ten most common misconfigurations that lead to intrusions and steps for avoiding them.

Prev2of3Next

Contact Us

See something of interest? Reach out and we would be happy to discuss opportunities with your you.