Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

08:00 AM
Dark Reading
Dark Reading
Products and Releases

K2 Intelligence Announces Partnership with BitVoyant

Partnership combines massive proprietary cyber datasets with leading cyber defense and corporate investigations expertise

(New York, May 18, 2016) – K2 Intelligence, an industry-leading cyber defense, investigative, and compliance services firm, and BitVoyant, a cyber intelligence services company, today announced a new partnership to co-develop cyber-derived business intelligence products and defense services based on massive proprietary cyber datasets.

K2 Intelligence, known for its investigative excellence, will integrate BitVoyant’s expansive datasets to provide defensive cyber products and services.  These products and services will deliver the ability to map multiple layers of risk across an enterprise, its vendors and partners; advise clients requiring cyber M&A due diligence; and help to inform cyber insurance underwriting. 

“We are in a new phase of the cyber battle, where companies can no longer operate in the dark without the necessary intelligence to stay ahead of advanced threats,” said Jeremy Kroll, President and Chief Executive Officer at K2 Intelligence. “BitVoyant’s valuable datasets in conjunction with our stellar cyber defense team and investigative strength, will provide clients with the information they need to make better business decisions and create stronger defense strategies.”

“Proprietary cyber information is the foundation of our partnership with BitVoyant, synergizing traditional business, Dark Web, and network intelligence,” said Austin Berglas, Senior Managing Director and Head of Cyber Defense at K2 Intelligence.  “The applications of this information are larger than just defense.  This enhanced cyber due diligence offering will provide a thorough risk analysis to protect enterprises against threats lurking in potential deals and partnerships.”

BitVoyant has been transitioning their sensitive technologies from the government world to the private sector under the leadership of BitVoyant, CEO, Jared Novick.  BitVoyant’s data sources and global capabilities obtain network information passively from outside company firewalls to derive valuable knowledge. BitVoyant’s current clients benefit from its wholly-owned proprietary data libraries derived from its global sensor grid.

“The partnership applies information not previously available to the commercial market.  It will allow us to harvest the potential of this data, and deliver value alongside the gold standard in corporate investigations,” said Novick.  “We are looking forward to rolling out products and services to large enterprise clients and law firms over the next few months.”

The K2 Intelligence team of cyber defense experts is comprised of former law enforcement and intelligence professionals with experience managing the most sophisticated and noteworthy investigations.  Their competitive advantage is their competence to provide a holistic capability aimed at creating a robust cyber security posture, respond to threats in near real-time, and proactively defend the network.

About K2 Intelligence

K2 Intelligence is an industry-leading investigative, compliance and cyber defense services firm founded in 2009 by Jeremy M. Kroll and Jules B. Kroll, the originator of the modern corporate investigations industry.  Over the last 40 years, Jules, Jeremy, and their teams have built a reputation not only for investigative, analytic and advisory excellence but for the independence and insight they bring to investigations.  With offices in New York, London, Madrid, Tel Aviv, Geneva, and Los Angeles, K2 Intelligence advises governments, companies, boards and individuals in business areas including: Complex Investigations & Disputes; Anti Money Laundering and Regulatory Compliance; Construction and Real Estate Project Oversight Monitoring & Compliance; Data Analytics & Visualization; and Cybersecurity Investigations & Defense.  

In 2015, American International Group, Inc. (AIG), a leading international insurance organization and the market leader in the underwriting of cyber insurance, endorsed the work of K2 Intelligence by acquiring a minority stake in the firm.  

For more information, visit www.k2intelligence.com

About BitVoyant

BitVoyant is a provider of cyber-derived business intelligence and proactive defense solutions. BitVoyant provides commercial information from their global sensor network to deliver competitive intelligence, proactive cyber defense, counterparty risk assessments, and supply chain analysis. BitVoyant supports the Fortune 100, law-firms, private equity groups, insurance underwriters and market-intelligence firms. BitVoyant’s offices are headquartered in Rosslyn, Virginia. www.bitvoyant.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-15
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
PUBLISHED: 2019-09-15
Cobham Sea Tel v170 224521 through v194 225444 devices allow attackers to obtain potentially sensitive information, such as a vessel's latitude and longitude, via the public SNMP community.
PUBLISHED: 2019-09-15
ScadaBR 1.0CE, and 1.1.x through 1.1.0-RC, has XSS via a request for a nonexistent resource, as demonstrated by the dwr/test/ PATH_INFO.
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.