top of page

![]() | ![]() |
|---|
Search


Cybersec Newsletter- Q3’24
I am bringing out this quarterly newsletter, summarizing my key article publications during the third quarter of 2024. Thanks for the...
madhukeshwar bhat
Sep 28, 20242 min read
Â
Â
Â


Generative AI security risks
Generative AI is the talk of the town. While this has brought revolution, it has also brought a host of security risks. With so many...
madhukeshwar bhat
Sep 7, 20241 min read
Â
Â
Â


DDoS attacks on IoT
We have adopted so much of IoT (Internet of Things) into our lives that we can’t think a day without them from smart homes, and...
madhukeshwar bhat
Aug 24, 20241 min read
Â
Â
Â


Identity & Access Management (IAM) and Machine Learning
In the era of Artificial Intelligence (AI) and Machine Learning (ML), it is quite interesting to see how these fit into existing ways of...
madhukeshwar bhat
Jul 27, 20241 min read
Â
Â
Â


Cybersec Newsletter- H1’24
I am bringing out this half yearly newsletter, summarizing my key article publications done during the first half of 2024. Thanks for the...
madhukeshwar bhat
Jul 7, 20244 min read
Â
Â
Â


Authentication
#cybersecurity #iam #identityandaccessmanagement In the virtual world or online universe, there is no possibility of humans validating...
madhukeshwar bhat
May 18, 20241 min read
Â
Â
Â


Cybertalk: Crime as a Service
When cybercrime is sold in a sophisticated fashion similar to Software as s Service (SaaS), it becomes, Crime as a Service. It has made...
madhukeshwar bhat
May 4, 20241 min read
Â
Â
Â


Cybertalk: Cybersecurity and Automation
Cybersecurity and automation complement each other. Automation is greatly helping cybersecurity by taking on tasks, which are almost...
madhukeshwar bhat
Apr 20, 20241 min read
Â
Â
Â


Cybertalk: Identity & Access Management and User Experience
User experience plays a vital role when it comes to user adoption of new tools. This applies to any kind of tool we need users to make...
madhukeshwar bhat
Apr 6, 20241 min read
Â
Â
Â


Cybersec Newsletter- Q1’24
I am bringing out this quarterly newsletter, summarizing my key article publications done during the first quarter of 2024. Thanks for...
madhukeshwar bhat
Mar 23, 20243 min read
Â
Â
Â


Cybertalk: How does Malware work?
Malware in simple terms is malicious software. It is designed to get into the victim’s computer systems via various means, such as social...
madhukeshwar bhat
Mar 9, 20241 min read
Â
Â
Â


Cybertalk: Zero-Day Vulnerabilities
Youtube: https://youtu.be/jRoL3OcshQ8 Zero-day vulnerabilities are security flaws or weaknesses in software unknown to the vendor or the...
madhukeshwar bhat
Feb 24, 20241 min read
Â
Â
Â


Supply chain attacks
Criminal hackers employ various tactics to get into an organization’s technology infrastructure. One of the indirect ways is via supply...
madhukeshwar bhat
Feb 10, 20241 min read
Â
Â
Â


Users as attack surface
Can users be leveraged as an attack surface in cyber attacks? Very much yes! While you and I might not be part of a computer system, our...
madhukeshwar bhat
Jan 26, 20241 min read
Â
Â
Â


Summarizing 2023
Happy New Year again! As promised in my previous post, I am summarizing my 2023 articles, which were not part of my previous post. How to...
madhukeshwar bhat
Jan 13, 20243 min read
Â
Â
Â


Happy Cybersafe New Year 2024!
#happynewyear #cybersecurity #identityandaccessmanagement #iam As we are about to step into 2024, it is time to take a moment for...
madhukeshwar bhat
Dec 30, 20234 min read
Â
Â
Â


CyberTalk: Can Blockchain be hacked?
In today’s discussion let’s explore blockchain. The key question is - can blockchain be hacked? While blockchain boasts to be highly...
madhukeshwar bhat
Dec 17, 20231 min read
Â
Â
Â


Cybertalk: Time to worry about Internet of Things (IOT) devices?
Sometimes we think that we have advanced ourselves so much that · We are able to start our car from our smartphones · ...
madhukeshwar bhat
Oct 27, 20231 min read
Â
Â
Â


Cybertalk: What are Dark Web, Deep Web and Surface Web?
The Internet is one of the biggest revolutions in human history. But, this revolution has two sides. When used for the betterment of...
madhukeshwar bhat
Oct 15, 20231 min read
Â
Â
Â


Cybertalk: Cloud Infrastructure Security and IAM
Cloud infrastructure be protected by leveraging the power of IAM (Identity and Access Management): - User and Role Management -...
madhukeshwar bhat
Sep 9, 20231 min read
Â
Â
Â
Contact
Thanks for your interest. For more information, feel free to get in touch and I will get back to you soon!
Email: madhu@madhubhat.com
bottom of page



