top of page

![]() | ![]() |
---|
Home: Welcome
Search

madhukeshwar bhat
Mar 11 min read
CyberTalk: QR Code Phishing
YouYube Link for CyberTalk: https://youtu.be/aZagBXRhbA8 QR codes have seamlessly integrated into our everyday routines. From street...
0 views
0 comments


madhukeshwar bhat
Feb 14 min read
Beware of Digital Arrest Scams: How to Protect Yourself from Cyber Criminals Impersonating Law Enforcement
Link to YouTube link for CyberTalk: https://youtu.be/apn9wncqRo8 In today's digital world, cyber criminals are constantly finding new...
1 view
0 comments


madhukeshwar bhat
Jan 194 min read
Uncovering the Hidden Dangers: The Critical Role of Privileged Identity Management in Today's Cybersecurity Landscape
In our rapidly changing digital world, organizations must leverage technology to boost performance and efficiency. However, this...
0 views
0 comments

madhukeshwar bhat
Jan 12 min read
Research: AI in Cybersecurity
Thrilled to have shared the stage with Satyavathi Divadari , Deputy Chief Information Security Officer (CISO) at Freshworks and Chairman...
0 views
0 comments

madhukeshwar bhat
Dec 21, 20242 min read
Honored to Facilitate a Thought-Provoking CXO Roundtable at the CSA Annual Summit
I had the privilege of facilitating an engaging CXO roundtable at the CSA Bangalore Chapter Annual Summit 2024 on the intriguing and...
0 views
0 comments

madhukeshwar bhat
Nov 16, 20241 min read
Advanced persistent threats (APT)
Cyber threats have become increasingly sophisticated and dangerous in today's highly interconnected digital world. One such category of...
1 view
0 comments


madhukeshwar bhat
Nov 3, 20241 min read
Panel discussion on : How Artificial Intelligence is Transforming Application Security
It was a great experience being part of the elite panel on “How Artificial Intelligence is Transforming Application Security” last week...
5 views
0 comments

madhukeshwar bhat
Oct 19, 20241 min read
CyberTalk: Role of authorization in protecting us
The role of authorization is very important when it comes to cybersecurity. We can go to two extremes when it comes to authorization. I...
1 view
0 comments

madhukeshwar bhat
Sep 28, 20242 min read
Cybersec Newsletter- Q3’24
I am bringing out this quarterly newsletter, summarizing my key article publications during the third quarter of 2024. Thanks for the...
1 view
0 comments

madhukeshwar bhat
Sep 7, 20241 min read
Generative AI security risks
Generative AI is the talk of the town. While this has brought revolution, it has also brought a host of security risks. With so many...
1 view
0 comments

madhukeshwar bhat
Aug 24, 20241 min read
DDoS attacks on IoT
We have adopted so much of IoT (Internet of Things) into our lives that we can’t think a day without them from smart homes, and...
3 views
0 comments

madhukeshwar bhat
Jul 27, 20241 min read
Identity & Access Management (IAM) and Machine Learning
In the era of Artificial Intelligence (AI) and Machine Learning (ML), it is quite interesting to see how these fit into existing ways of...
0 views
0 comments

madhukeshwar bhat
Jul 7, 20244 min read
Cybersec Newsletter- H1’24
I am bringing out this half yearly newsletter, summarizing my key article publications done during the first half of 2024. Thanks for the...
0 views
0 comments

madhukeshwar bhat
May 18, 20241 min read
Authentication
#cybersecurity #iam #identityandaccessmanagement In the virtual world or online universe, there is no possibility of humans validating...
1 view
0 comments

madhukeshwar bhat
May 4, 20241 min read
Cybertalk: Crime as a Service
When cybercrime is sold in a sophisticated fashion similar to Software as s Service (SaaS), it becomes, Crime as a Service. It has made...
2 views
0 comments

madhukeshwar bhat
Apr 20, 20241 min read
Cybertalk: Cybersecurity and Automation
Cybersecurity and automation complement each other. Automation is greatly helping cybersecurity by taking on tasks, which are almost...
2 views
0 comments

madhukeshwar bhat
Apr 6, 20241 min read
Cybertalk: Identity & Access Management and User Experience
User experience plays a vital role when it comes to user adoption of new tools. This applies to any kind of tool we need users to make...
3 views
0 comments

madhukeshwar bhat
Mar 23, 20243 min read
Cybersec Newsletter- Q1’24
I am bringing out this quarterly newsletter, summarizing my key article publications done during the first quarter of 2024. Thanks for...
2 views
0 comments

madhukeshwar bhat
Mar 9, 20241 min read
Cybertalk: How does Malware work?
Malware in simple terms is malicious software. It is designed to get into the victim’s computer systems via various means, such as social...
1 view
0 comments

madhukeshwar bhat
Feb 24, 20241 min read
Cybertalk: Zero-Day Vulnerabilities
Youtube: https://youtu.be/jRoL3OcshQ8 Zero-day vulnerabilities are security flaws or weaknesses in software unknown to the vendor or the...
2 views
0 comments
Home: Blog2
Contact
Thanks for your interest. For more information, feel free to get in touch and I will get back to you soon!
Email: madhu@madhubhat.com
Home: Contact
bottom of page