top of page

![]() | ![]() |
|---|
Search


Are hackers smarter than your cybersecurity talent?
Despite organizations building an army of technocrats to protect themselves, cyberattacks haven’t stopped. According to India’s Computer...
madhukeshwar bhat
Oct 20, 20222 min read


Cyber Talk: Identity and Access Management (IAM) and Integration
The technology market has a plethora of Identity and Access Management (IAM) products. The offerings are available both in on-premise as...
madhukeshwar bhat
Oct 8, 20221 min read


Cybersec Newsletter-Q3’22
I am bringing out this quarterly newsletter, summarizing my key article publications done during Q3’22. Thanks for the great responses to...
madhukeshwar bhat
Sep 24, 20225 min read


Video article on How to prevent Ransomware attacks?
What is a Ransomware? In layman’s terms- Ransomware is malicious software capable of holding computer devices and data for ransom....
madhukeshwar bhat
Sep 9, 20223 min read


Video article on Multicloud security part 2
In my prior post, I covered the challenges of multi-cloud set-up from the security point of view. In this post, I am covering the ways to...
madhukeshwar bhat
Aug 26, 20221 min read


Educational Video on Multi Cloud Security challenges
“Computing may someday be organized as a public utility just as the telephone system is a public utility”- Prof. John McCarthy at MIT’s...
madhukeshwar bhat
Aug 12, 20221 min read


Cybersecurity implementation manageable but operationalization difficult?
Cybersecurity capability set up are not merely Information Technology (IT) rollouts. Hence, benefits realization doesn’t happen with just...
madhukeshwar bhat
Jul 29, 20223 min read


Video Article on How to deliver successful Cybersecurity Transformation
Video article available here: LinkedIn: Article Link YouTube: https://www.youtube.com/watch?v=IBDTDFBj408 “By 2025 Cyber attackers will...
madhukeshwar bhat
Jul 15, 20222 min read


Zero Trust
There is too much talk about Zero Trust especially post COVID-19 pandemic. There are several questions such as What is Zero Trust? “Zero...
madhukeshwar bhat
Jul 8, 20221 min read


Cybersec Newsletter-Q2’22
I am bringing out this quarterly newsletter, summarizing my key article publications done during Q2’22. Thanks for the great responses to...
madhukeshwar bhat
Jul 1, 20225 min read


How prevent Identity Theft
Identity theft is a serious crime wherein one assumes someone else’s identity to perform fraudulent activities, from syphoning money from...
madhukeshwar bhat
Jun 24, 20221 min read


How to make a large scale Cybersecurity Transformation journey achievable?
In one of my earlier blogs on How to deliver Cybersecurity Transformation, I received several questions. The questions were mainly on how...
madhukeshwar bhat
Jun 17, 20224 min read


Time to think about Machine Identity Management?
Gartner defines Identity and Access Management (IAM) as s the discipline that enables the right individuals to access the right resources...
madhukeshwar bhat
Jun 10, 20221 min read


My CCSK Success Story
Thanks to Cloud Security Alliance (CSA) for interviewing me and publishing my success story: CCSK Success Stories: From a Banking Project...
madhukeshwar bhat
Jun 3, 20221 min read


Multi Cloud Security
Happy to share my article along with Rob Aragao, on Multi Cloud Security: https://cloudsecurityalliance.org/blog/2022/02/17/multi-cloud-s...
madhukeshwar bhat
May 27, 20221 min read


How to prevent Ransomware attacks?
What is a Ransomware? In layman’s terms- Ransomware is malicious software capable of holding computer devices and data for ransom....
madhukeshwar bhat
May 21, 20224 min read


Privacy, Artificial Intelligence and Intelligent Automation in Multi-Cloud Era!
This week: I thoroughly enjoyed delivering a global webinar along with Ramsés Gallego and Vinodh kumar Allam on Privacy Enablement and...
madhukeshwar bhat
May 16, 20221 min read


Webinar on Privacy Enablement and Artificial Intelligence in the Multi-Cloud Era
I am excited to share a podium with the best and the brightest of the industry – Vinodh kumar Allam and Ramsés Gallego to discuss · ...
madhukeshwar bhat
May 8, 20221 min read


How to implement Identity & Access Management for a large Enterprise?
Identity Access Management (IAM) is defined by Gartner as “the security discipline that enables the right individuals to access the right...
madhukeshwar bhat
Apr 22, 20223 min read


Is Role Based Access Control (RBAC) good enough?
What is Role Based Access Control (RBAC)? Role Based Access Control (RBAC) is an approach to controlling access to various resources...
madhukeshwar bhat
Apr 9, 20223 min read
Contact
Thanks for your interest. For more information, feel free to get in touch and I will get back to you soon!
Email: madhu@madhubhat.com
bottom of page



