top of page
Home: Welcome
Search
madhukeshwar bhat
Jan 12 min read
Research: AI in Cybersecurity
Thrilled to have shared the stage with Satyavathi Divadari , Deputy Chief Information Security Officer (CISO) at Freshworks and Chairman...
0 views0 comments
madhukeshwar bhat
Dec 21, 20242 min read
Honored to Facilitate a Thought-Provoking CXO Roundtable at the CSA Annual Summit
I had the privilege of facilitating an engaging CXO roundtable at the CSA Bangalore Chapter Annual Summit 2024 on the intriguing and...
0 views0 comments
madhukeshwar bhat
Nov 16, 20241 min read
Advanced persistent threats (APT)
Cyber threats have become increasingly sophisticated and dangerous in today's highly interconnected digital world. One such category of...
1 view0 comments
madhukeshwar bhat
Nov 3, 20241 min read
Panel discussion on : How Artificial Intelligence is Transforming Application Security
It was a great experience being part of the elite panel on “How Artificial Intelligence is Transforming Application Security” last week...
5 views0 comments
madhukeshwar bhat
Oct 19, 20241 min read
CyberTalk: Role of authorization in protecting us
The role of authorization is very important when it comes to cybersecurity. We can go to two extremes when it comes to authorization. I...
1 view0 comments
madhukeshwar bhat
Sep 28, 20242 min read
Cybersec Newsletter- Q3’24
I am bringing out this quarterly newsletter, summarizing my key article publications during the third quarter of 2024. Thanks for the...
1 view0 comments
madhukeshwar bhat
Sep 7, 20241 min read
Generative AI security risks
Generative AI is the talk of the town. While this has brought revolution, it has also brought a host of security risks. With so many...
1 view0 comments
madhukeshwar bhat
Aug 24, 20241 min read
DDoS attacks on IoT
We have adopted so much of IoT (Internet of Things) into our lives that we can’t think a day without them from smart homes, and...
3 views0 comments
madhukeshwar bhat
Jul 27, 20241 min read
Identity & Access Management (IAM) and Machine Learning
In the era of Artificial Intelligence (AI) and Machine Learning (ML), it is quite interesting to see how these fit into existing ways of...
0 views0 comments
madhukeshwar bhat
Jul 7, 20244 min read
Cybersec Newsletter- H1’24
I am bringing out this half yearly newsletter, summarizing my key article publications done during the first half of 2024. Thanks for the...
0 views0 comments
madhukeshwar bhat
May 18, 20241 min read
Authentication
#cybersecurity #iam #identityandaccessmanagement In the virtual world or online universe, there is no possibility of humans validating...
1 view0 comments
madhukeshwar bhat
May 4, 20241 min read
Cybertalk: Crime as a Service
When cybercrime is sold in a sophisticated fashion similar to Software as s Service (SaaS), it becomes, Crime as a Service. It has made...
2 views0 comments
madhukeshwar bhat
Apr 20, 20241 min read
Cybertalk: Cybersecurity and Automation
Cybersecurity and automation complement each other. Automation is greatly helping cybersecurity by taking on tasks, which are almost...
2 views0 comments
madhukeshwar bhat
Apr 6, 20241 min read
Cybertalk: Identity & Access Management and User Experience
User experience plays a vital role when it comes to user adoption of new tools. This applies to any kind of tool we need users to make...
3 views0 comments
madhukeshwar bhat
Mar 23, 20243 min read
Cybersec Newsletter- Q1’24
I am bringing out this quarterly newsletter, summarizing my key article publications done during the first quarter of 2024. Thanks for...
2 views0 comments
madhukeshwar bhat
Mar 9, 20241 min read
Cybertalk: How does Malware work?
Malware in simple terms is malicious software. It is designed to get into the victim’s computer systems via various means, such as social...
1 view0 comments
madhukeshwar bhat
Feb 24, 20241 min read
Cybertalk: Zero-Day Vulnerabilities
Youtube: https://youtu.be/jRoL3OcshQ8 Zero-day vulnerabilities are security flaws or weaknesses in software unknown to the vendor or the...
2 views0 comments
madhukeshwar bhat
Feb 10, 20241 min read
Supply chain attacks
Criminal hackers employ various tactics to get into an organization’s technology infrastructure. One of the indirect ways is via supply...
7 views0 comments
madhukeshwar bhat
Jan 26, 20241 min read
Users as attack surface
Can users be leveraged as an attack surface in cyber attacks? Very much yes! While you and I might not be part of a computer system, our...
3 views0 comments
madhukeshwar bhat
Jan 13, 20243 min read
Summarizing 2023
Happy New Year again! As promised in my previous post, I am summarizing my 2023 articles, which were not part of my previous post. How to...
0 views0 comments
Home: Blog2
Contact
Thanks for your interest. For more information, feel free to get in touch and I will get back to you soon!
Email: madhu@madhubhat.com
Home: Contact
bottom of page