Ajay Singh

Corporate Adviser/Fellow Institute of Directors/Former CEO/Author of - CyberStrong: A Primer on Cyber Risk Management for Business Managers (SAGE Publications 2020) & Visiting faculty-Cyber Risk Management & Strategy
Cyberattacks Top Global Risks as AI Fuels Misinformation and Disinformation

Cyberattacks Top Global Risks as AI Fuels Misinformation and Disinformation

By Ajay Singh, Author- CyberStrong & Introduction to Cybersecurity-Concepts, Principles, Technologies, and Practices The just released World Economic Forum (WEF)…

Metaverse- A case for regulation before innovation?

Metaverse- A case for regulation before innovation?

It is widely believed that the Metaverse is the next big thing that will shape the way we communicate and interact on the Internet. Top tech CEOs...

Fixing The Crisis of Digital Trust

Fixing The Crisis of Digital Trust

In recent years we have seen a rapid erosion in digital trust. A combination of several issues has brought us to a point where digital trust...

Harnessing the Power of Threat Intelligence for better Cybersecurity

Harnessing the Power of Threat Intelligence for better Cybersecurity

The value of intelligence in military and police operations is considered highly since it provides advanced knowledge of strategies, tactics,...

How to make Cybersecurity investments count-Part II

How to make Cybersecurity investments count-Part II

Business leaders and owners are predisposed and trained in understanding the concept of return on investment. Their methods of evaluating...

How to make Cybersecurity investments count

How to make Cybersecurity investments count

arge and small companies struggle to determine if their cybersecurity investments are adequate or well-directed. The growing frequency of...

Make the human firewall a key element of cybersecurity strategy

Make the human firewall a key element of cybersecurity strategy

The human firewall can be a critical element in warding off cyber-attacks and thwarting cybercrime. Our fascination with finding and deploying

AI vs AI: The Great Game

AI vs AI: The Great Game

The weaponization of AI was inevitable. As the defenders got their act together and began to close vulnerability gaps and protect entry points...

Top 10 Cybersecurity Challenges for 2023

Top 10 Cybersecurity Challenges for 2023

Cybersecurity is full of challenges, some new, some old but continuing, and some emerging. To be safe and secure, we need to deal with them all but prioritize and mitigate the significant risks in terms of severity of consequences

How SBOMS can help improve Supply Chain Cybersecurity

How SBOMS can help improve Supply Chain Cybersecurity

By Ajay Singh, Author of CyberStrong! A Primer on Cyber Risk Management for Business Managers Contemporary software development involves not…

Cybersecurity Debt: A Ticking Time Bomb!

Cybersecurity Debt: A Ticking Time Bomb!

cybersecurity debt is an accumulation of vulnerabilities that exist on account of shortcuts taken during the development, deployment...