Security Engineer
Keshav Malik
Keshav is a highly skilled and enthusiastic security engineer with a passion for all things tech, automation, and hacking. He is constantly seeking out new opportunities and innovative solutions to complex problems. This translates to the blogs written by him on his tech adventures.
Expertise
- Cybersecurity Blogs
- Front End Development
- Information Security
- Ethical Hacking
Experience
With over 2 years of experience, Keshav is currently working at LinkedIn as an information security engineer and has worked at various other companies such as FourKites, CloudNext Technologies, and CloudSEK.
Education
- Chandigarh University, B.Tech Information Security
- Data Structures and Algorithms – Geeks For Geeks
- Advanced Front End Web Developer using ReactJS
Credentials
- Microsoft Training Associate
- Certified Blockchain Basic Expert
- AWS Security Fundamentals
- Hacker Rank Problem Solving
Awards
- Security Intelligence Engineer 2018 – Explorer Award
- Security Intelligence Engineer 2018 – Mastery Award
Work at Astra
- 10 Best API Security Companies To Consider in 2025
- API Security: A Technical Guide
- OWASP Mobile Top 10 2025: A Security Guide
- Shadow APIs vs Zombie APIs – All You Need to Know
- Zombie APIs: What They Are and Why You Should Care
- What are Shadow APIs? How to Detect and Prevent Exposure?
- Top Cybersecurity Trends Shaping 2025
- AI in Cybersecurity: Benefits and Challenges
- OWASP API Top 10 Explained with Real-World Examples
- API Security Checklist: A Developer’s Guide
- A Step-by-Step NIST Compliance Checklist
- Demystifying NIST Vulnerability Management: A Comprehensive Guide
- GDPR Penetration Testing: Navigating Compliance Safely
- PCI Vulnerability Scan: Your Comprehensive Guide
- A Comprehensive Guide to Azure Data Security
- Secure Your Applications with Azure PaaS Security
- NIST Risk Management Framework Overview
- Decoding SOC 2 Reports: Why They Matter & The Role of Penetration Testing
- A Closer Look at NIST Vulnerability Assessment Process
- What is Continuous Vulnerability Scanning?
- 6-Step Android App Security Checklist
- Mastering AWS Cloud Security: A Practical 6-Step Checklist
- 6-Step OWASP Mobile App Security Checklist
- 7-Step Android Pentesting Checklist for Secure Android Apps
- What is Continuous Vulnerability Management?
- 3-Step Guide to Understanding Azure Security Management
- A Detailed Guide to NIST 800-171 Vulnerability Scanning
- PCI Compliance Checklist: 12 Requirements To Know
- What is PCI Risk Assessment: An In-Depth Guide
- Top 6 Mobile App Penetration Testing Tools
- 6 Practical Cyber Security Tips for Startups on a Budget
- Are Humans the Weakest Link in Cyber Security?
- Hacker/Cyber Security Movies & Series You Should Watch this Festive Season
- Top 10 Exploited Vulnerabilities in 2025 [Updated]
- A Detailed Guide to Firewall Penetration Testing
- Web Server Pentesting- What, Why, and How
- What is Cloud Security Assessment?
- What is Application Security Audit?
- A Step-by-Step Guide to PCI Penetration Testing
- A Complete Guide to Automated Vulnerability Scanning
- Automated VS Manual Security Testing – Which One to Choose?
- A Curated List of Top Pentest Tools in US
- 10 Best Penetration Testing Companies in 2025 Worldwide & USA (Comparison)
- Software Security Testing: Definition, Types & Tools
- All You Need to Know About Automated Security Testing Tools
- A Quick Guide on SQL Server Audit
- What is Network Security Audit and Why is it important?
- Google Cloud Security : Best practices and Security tools
- Why Defining Penetration Testing Scope is Important? – ASTRA
- A Comprehensive Guide to OWASP Penetration Testing
- NIST Penetration Testing: A Comprehensive Guide
- A Detailed Guide to Android Penetration Testing
- Types of Penetration Testing: A Comprehensive Guide
- Why Penetration Testing is Important
- A Comprehensive guide to iOS Penetration Testing
- Google Cloud Penetration Testing: Ensuring Cloud Security
- Penetration Testing Contract – You Need to Know About
- Everything You Need to Know About OWASP Top 10 2021
- What is Gray Box Penetration Testing?
- What does DAST Stand For?