Endorsed an Exceptional Talent (‘a recognized leader’) by the British Government, Akshay aka Ax is a Security Researcher and Engineer who holds passion for perpetual learning. In his spare time, he loves exploiting vulnerabilities, ethically and educating a wide range of audiences.
Ax’s expertise includes software development, web application penetration testing and research. Through responsible disclosure, he has previously exposed serious bugs and security vulnerabilities affecting national & global organizations like P.F. Chang’s, Planet Fitness, Comcast/Arris, Ellucian and the popular restaurant chain, Buca di Beppo.
In early 2018, Akshay helped prevent a massive data breach at Georgia Tech by going public with a serious flaw which was left unpatched for over a year. He hence earned himself a place on Tech’s Vulnerability Reporters “hall of fame” page.
To consult Akshay for your next big security project or pen-testing needs, drop him a note here.
- IDG Contributor Network: 7 ‘don’ts’ of diversity for fostering a healthy office cultureChange at a workplace is hard and often comes with improvements and challenges which cannot be ignored. Change can be a struggle for employees who often need time to gradually adapt themselves to it, rather than feeling forced into it. Even minor changes, for example, changing your company’s choice of… Read more »
- IDG Contributor Network: 5 ways a global presence can benefit your tech companyIf you run a successful tech startup or an established business, primarily offering digital products and services, chances are you have a significant customer presence worldwide. There also lies a high probability that you leverage a remote workforce ‘round-the-globe enabling increased collaboration over time zones. While staying local never hurt… Read more »
How to prepare for cybersecurity certifications?
The complete cybersecurity guide to preparing for certifications like CompTIA, OSCP, CySA+, CISSP, et al.
Feb 14, 2019 / 6min read. Read More
A separate island for everyone
Are we better off as a divided society?
Feb 12, 2019 / 3min read. Read More
The economics of making security a PR issue
Organizations focusing on stepping up their cybersecurity efforts are increasingly motivated by the potential for “negative press.” For…
Feb 11, 2019 / 6min read. Read More
USCIS E-Verify (I-9) sneaky loophole to bypass work authorization checks
The extensive documentation types accepted for E-Verify and Form I-9 make it possible for aliens to evade work authorization checks, even…
Feb 11, 2019 / 8min read. Read More
The fundamental flaw with Federated Identity and SSO
Single Sign-On (SSO) Technology has gained quite some momentum in the last few years, despite an obvious flaw
Feb 04, 2019 / 3min read. Read More
How about checking your OWN privilege first?
B.S. vs. Activism: I dare you to read this article in its entirety and then talk about privilege.
Jan 07, 2019 / 14min read. Read More
Analyzing 150+ Million Network Flows in Real-Time with nProbe and ElasticSketch
How we efficiently processed heavy NetFlow data in C++ to extract its volumetric characteristics, at Georgia Tech
Dec 17, 2018 / 10min read. Read More
Geolocation `Attack`: Entrapping your anonymous opponent online
How to misuse the Geolocation API to strip your online opponent’s anonymity. And, how to save yourself from it.
Nov 24, 2018 / 3min read. Read More
Technology has a bias — but it’s not the kind most talk about
Exploring left and right biases on a `neutral` web
Nov 21, 2018 / 9min read. Read More
My UK “Exceptional Talent” Endorsement Journey — a Guide for Digital Technologists
How I earned UK’s prestigious Exceptional Talent endorsement for Recognized Leaders
Nov 10, 2018 / 9min read. Read More