Endorsed an Exceptional Talent (‘a recognized leader’) by the British Government, Akshay aka Ax is a Security Researcher and Engineer who holds passion for perpetual learning. In his spare time, he loves exploiting vulnerabilities, ethically and educating a wide range of audiences.
Ax’s expertise includes software development, web application penetration testing and research. Through responsible disclosure, he has previously exposed serious bugs and security vulnerabilities affecting national & global organizations like P.F. Chang’s, Planet Fitness, Comcast/Arris, Ellucian and the popular restaurant chain, Buca di Beppo.
In early 2018, Akshay helped prevent a massive data breach at Georgia Tech by going public with a serious flaw which was left unpatched for over a year. He hence earned himself a place on Tech’s Vulnerability Reporters “hall of fame” page.
To consult Akshay for your next big security project or pen-testing needs, drop him a note here.
- IDG Contributor Network: Is our obsession with regulation killing the web?Anybody who’s been paying attention has noticed just how much the internet has changed within the last 10 years.From the humble looks of Google’s homepage to the vast existence old-school message boards and a virtually irrelevant “social” media, the internet largely felt like an accessory, a toy you could play… Read more »
- IDG Contributor Network: 7 steps to landing your first IT job, fastIT is a constantly expanding sector with its ever-increasing demand for skilled talent and the projected scope for growth within the next few years. This is especially true for the Information Security subfield for which the vacancies are drastically going up while the workers are struggling to catch up in… Read more »
- IDG Contributor Network: 7 ‘don’ts’ of diversity for fostering a healthy office cultureChange at a workplace is hard and often comes with improvements and challenges which cannot be ignored. Change can be a struggle for employees who often need time to gradually adapt themselves to it, rather than feeling forced into it. Even minor changes, for example, changing your company’s choice of… Read more »
- IDG Contributor Network: 5 ways a global presence can benefit your tech companyIf you run a successful tech startup or an established business, primarily offering digital products and services, chances are you have a significant customer presence worldwide. There also lies a high probability that you leverage a remote workforce ‘round-the-globe enabling increased collaboration over time zones. While staying local never hurt… Read more »
What is cybersquatting? And why is it a BIG deal?
From protecting your trademark to censorship, the uses of domain squatting are truly multifaceted and vastly unregulated.
Jul 18, 2019 / 7min read. Read More
Tech’s ongoing digital identity crisis: who is going to solve it?
What is meant by identity? Is it a name you, your friends and family call you, or what a document states as a true likeliness of you?
Jul 04, 2019 / 6min read. Read More
Demystifying Java JNDI attacks
How this Java API — rather its implementation could have catastrophic consequences on your application’s security, and what can you do…
Mar 27, 2019 / 2min read. Read More
How to prepare for cybersecurity certifications?
The complete cybersecurity guide to preparing for certifications like CompTIA, OSCP, CySA+, CISSP, et al.
Feb 14, 2019 / 6min read. Read More
The economics of making security a PR issue
Organizations focusing on stepping up their cybersecurity efforts are increasingly motivated by the potential for “negative press.” For…
Feb 11, 2019 / 6min read. Read More
USCIS E-Verify (I-9) sneaky loophole to bypass work authorization checks
The extensive documentation types accepted for E-Verify and Form I-9 make it possible for aliens to evade work authorization checks, even…
Feb 11, 2019 / 8min read. Read More
The fundamental flaw with Federated Identity and SSO
Single Sign-On (SSO) Technology has gained quite some momentum in the last few years, despite an obvious flaw
Feb 04, 2019 / 3min read. Read More
Analyzing 150+ Million Network Flows in Real-Time with nProbe and ElasticSketch
How we efficiently processed heavy NetFlow data in C++ to extract its volumetric characteristics, at Georgia Tech
Dec 17, 2018 / 10min read. Read More
Geolocation `Attack`: Entrapping your anonymous opponent online
How to misuse the Geolocation API to strip your online opponent’s anonymity. And, how to save yourself from it.
Nov 24, 2018 / 3min read. Read More
Technology has a bias — but it’s not the kind most talk about
Exploring left and right biases on a `neutral` web
Nov 21, 2018 / 9min read. Read More