top of page
  • Writer's picturemadhukeshwar bhat

Summarizing 2023

Happy New Year again!

As promised in my previous post, I am summarizing my 2023 articles, which were not part of my previous post.

It is extremely common for large organizations to have a mix of on-premise Information Technology (IT) set up as well as their IT spread across different cloud vendors. Especially, with Cloud adoption catching up at a rapid pace, a hybrid multi-Cloud environment is quite common today. Hence, the organizations are left with their existing on-premise IT set up along with either evolving Cloud or an already established Cloud set up. How to solve the Identity Access Management (IAM) problem for such setups?

Machine learning and cybersecurity both are widely discussed topics today. How can machine learning enable cybersecurity? Some of the areas worth looking at are:- Anomaly Detection- Malware Detection- User behavior Analytics- Threat Intelligence- Phishing and Spam Detection- Vulnerability AssessmentMachine learning can be leveraged very effectively as a key enabler for cybersecurity. Today, data is a key asset. Using this key asset machine learning can do wonders protecting our systems.

Business and commerce don’t have national boundaries. All that matters is the commercial interests of the parties involved in the business transactions. It is these business interests, that have fueled cloud’s exponential growth so far. However, some unforeseen situations could put these equations at great risk. What if a cloud provider is compelled to stop service offering to customers of certain geography without prior notice? In that scenario, what is the way forward for the business, who are ultimately answerable to the end customers?

Cloud infrastructure be protected by leveraging the power of IAM (Identity and Access Management):- User and Role Management- Implementing least privilege- Authentication and Authorization- Centralized access control IAM (Identity and Access Management) does play an important role in securing cloud infrastructure. The key aspect in leveraging this capability is ensuring the right implementation of IAM in Cloud.

The Internet is one of the biggest revolutions in human history. But, this revolution has two sides. When used for the betterment of human society, we can’t thank enough this great innovation for the benefits it has brought. However, on the other hand, its misuse by cybercriminals has disastrous effects. It is interesting to know that what is accessible to the general public like you and me is a very small portion called surface web. The largest portion of the internet is called the deep web, which is not accessible to you and me. Sometimes, the deep web is confused with the dark web and thought to be illegal. In fact, the deep web includes a significant amount of legitimate information. While the dark web itself is not inherently illegal, it has gained a bad reputation for hosting various illegal activities.

IoT devices are one of the biggest innovations of mankind making our life very simple and enjoyable. The affordability has made the reach to the wider populations across the globe. However, there are always anti-social elements, who make our life a little bit harder. I am sure that none of us like to be frisked at the airport for example, but no choice; it is the smaller price we have to pay for a luxury and fear-free flight experience as compared to hijackers putting our life at risk! Similarly, securing our organizations and ourselves from hackers needs a small price in terms of building protections around the fancy IoT devices. No one likes to remember the complex password or authentication via different channels, but that’s the only way to protect ourselves!

 The key question is - can blockchain be hacked? While blockchain boasts to be highly resilient, we can’t conclude that it can’t be hacked. The decentralized nature of blockchain ensures that there is no single point of failure, but there are vulnerabilities and attack vectors that need to be considered:

  • 51% attack

  • Vulnerabilities within smart contracts

  • End-user errors

  • Sybil Attacks

  • Bugs in software

  • Supply Chain Attacks

0 views0 comments

Recent Posts

See All


Post: Blog2_Post
bottom of page