Articles & Abstracts

Kivu Consulting announces strategic partnership with Cerberus Sentinel

Filter by:
Showing 37 - 48 of 56
  • Blog
    Understanding the Methods of Infiltration: Attack Vectors

    Threat actors use many different methods to breach or infiltrate their victims’ network. These methods are known as attack vectors.

  • Blog
    Kivu Coffee Break: Holiday Cyber Security Tips

    Natalie Fioravanti and Nicholas P. R. Steinmann provide us with tips to stay safe online this holiday season.

  • Blog
    Cyber Tips for the Holiday Season

    Learn tips to keep you and your information safe while holiday shopping and finding the cyber deal this holiday season.

  • Blog
    Ten Common Computer Security Misconfigurations & What to Avoid

    Kivu consulting has identified the top ten most common misconfigurations that lead to intrusions and steps for avoiding them.

  • Blog
    Kivu and Lockton MEDR Announcement

    Kivu Consulting partners with Lockton to provide a cost-effective solution to reduce ransomware risk.

  • Blog
    Surviving a ransomware attack

    This is a case study story about asset inventory, and more broadly the importance of knowing your operational environment.

  • Blog
    Build A Dream Team In A Weekend

    Kivu’s first-ever all-company retreat overcame the logistical challenge of bringing in over 120 employees from around the world to become a roaring success story.

  • Blog, News
    Negotiating with Cyber Terrorists

    Kivu’s Global Managing Director Winston Krone was recently featured in the Washington Post and Bloomberg Opinion, talking to journalist Mark Gilbert about how ransomware threat actors have adapted to the ‘new normal’.

  • Blog, Resources
    New Report Combines Kivu and Hiscox Data on Ransomware Trends

    This report delves into ransomware and doxing trends, providing a detailed assessment of affected industries and countries.

  • Blog
    Kivu Awarded Patent for IR Technology

    Kivu, a global cyber security solutions provider and trusted partner to insurance carriers and law firms, announced today it has been successful in its application for a patent for its proprietary technology used to remotely collect data as part of its cyber incident response service.

  • Blog
    Testing Password Encryption Strength

    Security risks associated with weak user-created passwords are well documented. In 2009, for example, cyber security provider Imperva analyzed more than 32 million passwords that were released in a 2009 data breach.

  • A False Promise of Pause on Ransomware Attacks in Healthcare

    The Internet has been buzzing with reports that ransomware operators promise not to target health and medical organizations during the COVID-19 pandemic.


Contact Us

See something of interest? Reach out and we would be happy to discuss opportunities with your you.