top of page

![]() | ![]() |
---|
Home: Welcome
Search

The Evolving Cyber Threat Landscape
The cyber threat landscape has become increasingly complex, dynamic, and impactful, presenting significant challenges for organizations...
madhukeshwar bhat
Mar 221 min read
2 views
0 comments

CyberTalk: QR Code Phishing
YouYube Link for CyberTalk: https://youtu.be/aZagBXRhbA8 QR codes have seamlessly integrated into our everyday routines. From street...
madhukeshwar bhat
Mar 11 min read
2 views
0 comments


Beware of Digital Arrest Scams: How to Protect Yourself from Cyber Criminals Impersonating Law Enforcement
Link to YouTube link for CyberTalk: https://youtu.be/apn9wncqRo8 In today's digital world, cyber criminals are constantly finding new...
madhukeshwar bhat
Feb 14 min read
2 views
0 comments


Uncovering the Hidden Dangers: The Critical Role of Privileged Identity Management in Today's Cybersecurity Landscape
In our rapidly changing digital world, organizations must leverage technology to boost performance and efficiency. However, this...
madhukeshwar bhat
Jan 194 min read
0 views
0 comments

Research: AI in Cybersecurity
Thrilled to have shared the stage with Satyavathi Divadari , Deputy Chief Information Security Officer (CISO) at Freshworks and Chairman...
madhukeshwar bhat
Jan 12 min read
1 view
0 comments

Honored to Facilitate a Thought-Provoking CXO Roundtable at the CSA Annual Summit
I had the privilege of facilitating an engaging CXO roundtable at the CSA Bangalore Chapter Annual Summit 2024 on the intriguing and...
madhukeshwar bhat
Dec 21, 20242 min read
1 view
0 comments

Advanced persistent threats (APT)
Cyber threats have become increasingly sophisticated and dangerous in today's highly interconnected digital world. One such category of...
madhukeshwar bhat
Nov 16, 20241 min read
1 view
0 comments


Panel discussion on : How Artificial Intelligence is Transforming Application Security
It was a great experience being part of the elite panel on “How Artificial Intelligence is Transforming Application Security” last week...
madhukeshwar bhat
Nov 3, 20241 min read
5 views
0 comments

CyberTalk: Role of authorization in protecting us
The role of authorization is very important when it comes to cybersecurity. We can go to two extremes when it comes to authorization. I...
madhukeshwar bhat
Oct 19, 20241 min read
1 view
0 comments

Cybersec Newsletter- Q3’24
I am bringing out this quarterly newsletter, summarizing my key article publications during the third quarter of 2024. Thanks for the...
madhukeshwar bhat
Sep 28, 20242 min read
1 view
0 comments

Generative AI security risks
Generative AI is the talk of the town. While this has brought revolution, it has also brought a host of security risks. With so many...
madhukeshwar bhat
Sep 7, 20241 min read
1 view
0 comments

DDoS attacks on IoT
We have adopted so much of IoT (Internet of Things) into our lives that we can’t think a day without them from smart homes, and...
madhukeshwar bhat
Aug 24, 20241 min read
3 views
0 comments

Identity & Access Management (IAM) and Machine Learning
In the era of Artificial Intelligence (AI) and Machine Learning (ML), it is quite interesting to see how these fit into existing ways of...
madhukeshwar bhat
Jul 27, 20241 min read
0 views
0 comments

Cybersec Newsletter- H1’24
I am bringing out this half yearly newsletter, summarizing my key article publications done during the first half of 2024. Thanks for the...
madhukeshwar bhat
Jul 7, 20244 min read
0 views
0 comments

Authentication
#cybersecurity #iam #identityandaccessmanagement In the virtual world or online universe, there is no possibility of humans validating...
madhukeshwar bhat
May 18, 20241 min read
1 view
0 comments

Cybertalk: Crime as a Service
When cybercrime is sold in a sophisticated fashion similar to Software as s Service (SaaS), it becomes, Crime as a Service. It has made...
madhukeshwar bhat
May 4, 20241 min read
2 views
0 comments

Cybertalk: Cybersecurity and Automation
Cybersecurity and automation complement each other. Automation is greatly helping cybersecurity by taking on tasks, which are almost...
madhukeshwar bhat
Apr 20, 20241 min read
2 views
0 comments

Cybertalk: Identity & Access Management and User Experience
User experience plays a vital role when it comes to user adoption of new tools. This applies to any kind of tool we need users to make...
madhukeshwar bhat
Apr 6, 20241 min read
3 views
0 comments

Cybersec Newsletter- Q1’24
I am bringing out this quarterly newsletter, summarizing my key article publications done during the first quarter of 2024. Thanks for...
madhukeshwar bhat
Mar 23, 20243 min read
2 views
0 comments

Cybertalk: How does Malware work?
Malware in simple terms is malicious software. It is designed to get into the victim’s computer systems via various means, such as social...
madhukeshwar bhat
Mar 9, 20241 min read
1 view
0 comments
Home: Blog2
Contact
Thanks for your interest. For more information, feel free to get in touch and I will get back to you soon!
Email: madhu@madhubhat.com
Home: Contact
bottom of page