Kivu has built an industry leading reputation combating cyber extortion and responding to cyber-crime, enabling our clients to make informed, cost-effective decisions
Blog
Cyb(h)er: Interview with Alicia Putrino (EP1)
Gain interesting insight into the educational sector and advice on how to better ourselves within the realm of cyber.
Blog
Ransomware: Where We Are Now
Ransomware is now one of the fastest-growing threats in cybersecurity that is ever-evolving. With attacks that are more aggressive and diverse than ever before. Threat actors are constantly improving with the use of multiple attack vectors.
Blog
Introducing Our Managed Security Services
With Kivu’s MSS product organizations leverage a trusted team of experts to help prevent, detect, respond to and hunt for threats in their environment.
Blog
Safeguarding data, encryption, tokenization and hashing
Encryption is a best practice that helps safeguard private data “at rest” (in the database). However, most companies don’t deploy encryption.
Blog
Cyber Insurance & Ransomware
When an organization responds to a successful ransomware attack without outside assistance, it’s dueling with an adversary that’s already outwitted it technically, and is probably many times more experienced extracting the maximum ransom amounts from its victims.
Blog
Kivu Coffee Break: Attack Vectors: How to Prevent an Infiltration?
Conversation about the main attack vectors, how they infiltrate networks, and what protective measures to take for your company.
Blog
Understanding the Methods of Infiltration: Attack Vectors
Learn the methods that threat actors use to breach or infiltrate their victims’ network and how to protect your company.
Blog
Understanding the Methods of Infiltration: Attack Vectors
Threat actors use many different methods to breach or infiltrate their victims’ network. These methods are known as attack vectors.
Blog
Kivu Coffee Break: Holiday Cyber Security Tips
Natalie Fioravanti and Nicholas P. R. Steinmann provide us with tips to stay safe online this holiday season.
Blog
Cyber Tips for the Holiday Season
Learn tips to keep you and your information safe while holiday shopping and finding the cyber deal this holiday season.
Blog
Ten Common Computer Security Misconfigurations & What to Avoid
Kivu consulting has identified the top ten most common misconfigurations that lead to intrusions and steps for avoiding them.