Ajay KumarImportance of Trust, Risk, and Security Management of Generative AI technologyIn my previous article, I put my thoughts around potential cybersecurity risk of ChatGPT usage. If you’re interested to read it than go…Jul 6, 20231Jul 6, 20231
Ajay KumarWhat are the Potential Cybersecurity Risks of ChatGPT Usage?ChatGPT is a large language model trained by OpenAI, one of the most advanced conversational AI models available today and can engage in a…Apr 15, 20232Apr 15, 20232
Ajay KumarZero Trust Security: The Key to Securing Digital TransformationWhat are the challenges of castle-and-moat security in running today’s digital businesses?Apr 8, 20231Apr 8, 20231
Ajay KumarA Business Case for External Attack Surface Management ProgramCloud first, digital transformation and post pandemic world of remote & Hybrid working models have led to expansion of organization’s…Apr 3, 20231Apr 3, 20231
Ajay KumarUnderstand Mobile Attack Surface and How to ProtectApproximately 81 percent of financial applications potentially leaked sensitive information.Mar 28, 2023Mar 28, 2023
Ajay KumarHow Does Data Privacy Matter?Data privacy is a critical issue in today’s age, and individuals and organizations have a responsibility to protect personal informationMar 18, 2023Mar 18, 2023
Ajay KumarMicrosoft Defender Cloud Security Posture Management (CSPM) — A Pillar for Multi Cloud Security…65 to 70 percent of all security challenges in the cloud arise from misconfigurations.Mar 16, 2023Mar 16, 2023
Ajay KumarBest Practices for Secrets Management77 percent of cloud breaches involved compromised credentialsMar 13, 2023Mar 13, 2023
Ajay KumarThe Importance of Data Protection with AWS Key Management ServicesData encryption is a critical control both from the security as well as compliance aspect of protecting the enterprise dataMar 5, 2023Mar 5, 2023
Ajay KumarThe Financial Impact of a Data Breach on BusinessesCISOs have become a new target in civil and criminal litigationMar 3, 2023Mar 3, 2023