KBO
Compliance with the Power Preparedness Regulation / NVE´s KBF
At Berigo, we have been privileged to be a part of the conversation and a consultative partner to NVE in their recent investigation into the use of Microsoft Compliance Manager for compliance with the Kraftberedskapsforskriften (Power Preparedness Regulation). This regulation is crucial for securing digital information systems in the energy Read more…
Cybercrime Supply Chain
The Imperative of Supply Chain Protection in the Cybersecurity Landscape
In the rapidly evolving world of cybersecurity, supply chain attacks have emerged as a significant threat. These attacks, where hackers infiltrate widely used software to distribute malicious code, have the potential to impact thousands, if not millions, of systems. A recent example of this is the attack on the Voice Read more…
AI Cybercrime
AI as a Public Good: Harnessing the Power of Artificial Intelligence to Bolster Democracy
Artificial Intelligence (AI) has been a transformative force across various sectors, and its potential impact on democracy is a topic of intense debate. While there are valid concerns about AI systems like ChatGPT and GPT4 potentially harming democracy by overwhelming public discourse with autogenerated arguments, there’s also a promising alternative Read more…
AI
Securing the Future: Navigating the Complex Landscape of AI Security Risks
Artificial Intelligence (AI) has been a game-changer in many sectors, but it also brings with it a host of security risks. A new report from Stanford and Georgetown delves into these risks, particularly focusing on adversarial machine learning. The report is the result of a workshop held on the topic, Read more…
Cybercrime
FBI Disables Russian Malware
In a significant development in the ongoing cyber warfare, the Federal Bureau of Investigation (FBI) has successfully identified and disabled a potent piece of malware, allegedly deployed by Russia’s FSB security service. This operation, as reported by Reuters, was aimed at neutralizing a key cyber espionage tool in Russia’s arsenal, Read more…
Cybercrime Leadership
The Human Firewall: Strengthening Information Security through Behavioral Change
In the battle against cyber threats, the human factor is often the weakest link. This article explores how leaders can strengthen their organization’s human firewall using principles of behavioral influence. In the realm of cybersecurity, the human factor is often the weakest link. The FBI reported that between October 2013 Read more…