Research and Publications

What Real-Life Kidnappings Can Teach Us About Dealing With Digital Ones

Kidnappings for ransom have been dramatized on television and in the movies and detailed on the news.  Experts are now looking at these to better understand how to deal with the growing threat of ransomware, which is now a billion dollar a year industry.

Ransomware v2: Facing the Latest Cyber Security Threats

There’s no doubt that ransomware attacks are on the rise and they’re becoming more insidious. Mark Greisiger spoke with Winston Krone, global managing director of Kivu Consulting about what the latest version of ransomware looks like and what risk managers should do if it strikes their organization.

ForenData Leakage Imagesic Analysis Reveals Data Leaks in HIPAA Compliant Software

PII/PHI data leakage, or the unauthorized transfer of PII/PHI, continues to be a significant risk for healthcare organizations. Exposed PII/PHI goes undetected due to lack of awareness and over-reliance on software, Megan Bell, Senior Director Analytics, Kivu and Adam C. Solander, Member of the Firm, Epstein Becker Green, (Oct 2015)


Hidden data hidden threatHidden data: hidden threat

Some of the worst and most costly data breaches occur because an organisation doesn’t know what and how much data they have stored, says Winston Krone in an interview for Hiscox Global Insight. (September 2015)


Five Things ImageFive Things Hackers Don’t Want Small-To-Medium Sized Business Owners To Know

Many small-to-medium (SMB) sized businesses believe that they aren’t important or large enough to be targeted by hackers. Unfortunately, that’s not the case, Winston Krone, Managing Director, Kivu. (August, 2015)



Security Guidance for Early Adopters of the Internet of Things (IoT) contributing authors, Cloud Security Alliance (April 2015)

The Role of Cybersecurity Insurance in Cyber Risk Management, (June, 2014)

Samsung Galaxy Camera Forensics, Kivu White Paper, Catherine Stamm (April, 2014)

Information Security of HIEs – Are Humans the Weakest Link?, (January, 2014)

Cyber Liability & Data Breach Insurance Claims – A Study of Actual Claim Payouts, 2013 NetDiligence®, (November, 2013)

Healthcare Data Vulnerabilities: How Forensics Can Help You Comply with the HIPAA Final Omnibus Rule, ID Experts Blog (July, 2013)

Analytics May Reduce PHI Exposure Risk in a Healthcare Data Breach, ID Experts Blog (April, 2013)

Safeguarding Data: Encryption, Tokenization and Hashing, NetDiligence Junto Blog (January, 2013)

Security Guidance for Critical Areas of Mobile Computing version 1.0,, contributing authors, Cloud Security Alliance (November, 2012)

Best Practices for Collecting and Preserving Digital Communications in Workplace Investigations, AWI Quarterly (July, 2012)

Solid state drives: Forensic preservation issues, (IN)SECURE Magazine (June, 2012)

Chapter 15: Legal and Technical Issues Concerning Evidence in Data Breach Cases, 2012 PLI Privacy and Data Security Law Institute (May, 2012)

Digital Forensics: Key to Successful Healthcare Data Breach Response, ID Experts (May, 2012)

Critical Data Privacy Issues: Best Practices for Navigating the Legal Landscape and Minimizing Risk, Sedgewick Law Publications (September, 2011)

Quicken: Deleted Data Has Hidden Traces, DFI News (August, 2011)

Be Concerned about IRS. QuickBooks Digital Audits, California Enrolled Agent (May/June, 2011)

Virtual Machines: Added Planning to the Forensic Acquisition Process, (IN)SECURE Magazine (March, 2011)

Software Bugs in Common E-Discovery Search Tools, Kivu White Paper (October, 2010)

Webinar: How to Take Action When a Security Breach Hits, Institute for Health Technology Transformation (October, 2010)