Articles & Abstracts
Cyb(HER) Series

Cyb(HER): Interview with Patricia Kocsondy

An interview with Patricia Kocsondy, Head of US Cyber Risks at Beazley and Kivu's Director of Incident Response, Candice Wendt.

Filter by:
Showing 25 - 36 of 55
  • Blog
    Kivu Hires VP of Recovery & Transformation

    Kivu Consulting, a leading provider of cybersecurity and forensic services to organizations worldwide, announced that Adam Tyra is joining as Vice President of Recovery and Transformation. Tyra and his team are positioning clients towards success by building a more robust and safer infrastructure.

  • Resources
    Changing Face of Cyber Claims Report

    Clive Cully, UK Director joined experts from Marsh and Microsoft for a webinar discussing the Changing Face of Cyber Claims report, which provided insights into managing and mitigating cyber risk and claims.

  • Blog
    OFAC Advisories Highlight Risks in Paying Ransoms

    The FinCEN and OFAC advisories offer a warning to all those providing ransomware response services or insurance coverage for ransomware payments.

  • Blog
    Cyber Extortion & Ransomware

    Kivu has built an industry leading reputation combating cyber extortion and responding to cyber-crime, enabling our clients to make informed, cost-effective decisions

  • Blog
    Cyb(h)er: Interview with Alicia Putrino (EP1)

    Gain interesting insight into the educational sector and advice on how to better ourselves within the realm of cyber.

  • Blog
    Ransomware: Where We Are Now

    Ransomware is now one of the fastest-growing threats in cybersecurity that is ever-evolving. With attacks that are more aggressive and diverse than ever before. Threat actors are constantly improving with the use of multiple attack vectors.

  • Blog
    Introducing Our Managed Security Services

    With Kivu’s MSS product organizations leverage a trusted team of experts to help prevent, detect, respond to and hunt for threats in their environment.

  • Blog
    Safeguarding data, encryption, tokenization and hashing

    Encryption is a best practice that helps safeguard private data “at rest” (in the database). However, most companies don’t deploy encryption.

  • Blog
    Cyber Insurance & Ransomware

    When an organization responds to a successful ransomware attack without outside assistance, it’s dueling with an adversary that’s already outwitted it technically, and is probably many times more experienced extracting the maximum ransom amounts from its victims.

  • Blog
    Kivu Coffee Break: Attack Vectors: How to Prevent an Infiltration?

    Conversation about the main attack vectors, how they infiltrate networks, and what protective measures to take for your company.

  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Learn the methods that threat actors use to breach or infiltrate their victims’ network and how to protect your company.

  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Threat actors use many different methods to breach or infiltrate their victims’ network. These methods are known as attack vectors.


Contact Us

See something of interest? Reach out and we would be happy to discuss opportunities with your you.