top of page
All Posts


How to prevent Ransomware attacks?
What is a Ransomware? In layman’s terms- Ransomware is malicious software capable of holding computer devices and data for ransom....
Madhukeshwar Bhat
May 21, 20224 min read


Privacy, Artificial Intelligence and Intelligent Automation in Multi-Cloud Era!
This week: I thoroughly enjoyed delivering a global webinar along with Ramsés Gallego and Vinodh kumar Allam on Privacy Enablement and...
Madhukeshwar Bhat
May 16, 20221 min read


Webinar on Privacy Enablement and Artificial Intelligence in the Multi-Cloud Era
I am excited to share a podium with the best and the brightest of the industry – Vinodh kumar Allam and Ramsés Gallego to discuss · ...
Madhukeshwar Bhat
May 8, 20221 min read


How to implement Identity & Access Management for a large Enterprise?
Identity Access Management (IAM) is defined by Gartner as “the security discipline that enables the right individuals to access the right...
Madhukeshwar Bhat
Apr 22, 20223 min read


Is Role Based Access Control (RBAC) good enough?
What is Role Based Access Control (RBAC)? Role Based Access Control (RBAC) is an approach to controlling access to various resources...
Madhukeshwar Bhat
Apr 9, 20223 min read


Is Integration a pain point for Identity and Access Management (IAM) Transformations?
The technology market has a plethora of Identity and Access Management (IAM) products. The offerings are available both in on-premise as...
Madhukeshwar Bhat
Apr 1, 20223 min read


International politics- a key cloud adoption consideration?
Business and commerce don’t have national boundaries. All that matters is the commercial interests of the parties involved in the...
Madhukeshwar Bhat
Mar 25, 20222 min read


Is your Organization Cybersecurity Tech ready?
The technology market has tons of Cybersecurity products from top-notch Cyber Security vendors. But, the question is whether your...
Madhukeshwar Bhat
Mar 16, 20222 min read


Zero Trust and Identity Access Management (IAM) in the context of log4j vulnerability
Log4j Zero Day Vulnerability (NIST Ref: https://nvd.nist.gov/vuln/detail/CVE-2021-44228) shook us back in late 2021. No one would have...
Madhukeshwar Bhat
Feb 25, 20222 min read


Is Cryptocurrency a great investment or a cyber threat?
An interesting article from Times of India compared the evolution of cryptocurrency to the Tulipmania of the 17th century. The article...
Madhukeshwar Bhat
Feb 19, 20223 min read


Is Cloud not as secure as your company-owned Data Center?
According to one of the Deloitte Reports Cloud ranks No.1 amongst the emerging technologies for the past 3 consecutive years. COVID-19...
Madhukeshwar Bhat
Jan 26, 20223 min read


What is Zero Trust?
There is too much talk about Zero Trust especially post COVID-19 pandemic. There are several questions such as What is Zero Trust? “Zero...
Madhukeshwar Bhat
Jan 19, 20224 min read


How to deliver successful Cybersecurity Transformation?
“By 2025 Cyber attackers will have weaponized Operational Technology Environments to successfully harm or kill humans” – Gartner Cat and...
Madhukeshwar Bhat
Jan 12, 20223 min read


How to prevent Identity theft?
What is identity theft? Identity theft is a serious crime wherein one assumes someone else’s identity to perform fraudulent activities...
Madhukeshwar Bhat
Jan 5, 20223 min read


Happy New year 2022!
Wish you a very Happy New Year! Hope the New Year brings you lots of happiness, prosperity, and Cyber Safety! Being Cyber Safe is the...
Madhukeshwar Bhat
Jan 1, 20222 min read
bottom of page