Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>

Aryaka Blog Author

Blog Home > Author > Aditya K Sood

Aditya K Sood

VP of Security Engineering and AI Strategy

Aditya K Sood (Ph.D) is the VP of Security Engineering and AI Strategy at Aryaka.. With more than 16 years of experience, he provides strategic leadership in information security, covering products and infrastructure. Dr. Sood is interested in Artificial Intelligence (AI), cloud security, malware automation and analysis, application security, and secure software design. He has authored several papers for various magazines and journals, including IEEE, Elsevier, Crosstalk, ISACA, Virus Bulletin, and Usenix. He has been an active speaker at industry conferences and presented at Blackhat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP, and many others. Dr. Sood obtained his Ph.D. in Computer Sciences from Michigan State University. Dr. Sood is also an author of the "Targeted Cyber Attacks" and “Empirical Cloud Security” books. He held positions such as Senior Director of Threat Research and Security Strategy, Head (Director) of Cloud Security, Chief Architect of Cloud Threat Labs, Lead Architect and Researcher, and others while working for companies such as F5 Networks, Symantec, Blue Coat, Elastica, and KPMG.

Read Blogs by Aditya K Sood

BatShadow: Vietnamese Threat Actor Expands Its Digital Operations
By Aditya K Sood | By Varadharajan K | Sept 25, 2025 Get the new Batshadow Threat Report or Explore[...]
Read Post >
Wiley’s Internet Technology Letters Published Research on Generative AI for Adaptive Threat Hunting
Recently, we published a research piece in Wiley’s Internet Technology Letters on highlighting the importance of Generative (GenAI) for revolutionizing[...]
Read Post >
North Korea’s Kimsuky APT: A Stealthy Threat Adapting to the Evolving Digital World
By Aditya K Sood | By Varadharajan K | July 29, 2025 In today’s hyper-connected landscape, the traditional notion of[...]
Read Post >
Advanced AI Security Research Released in Communications of the ACM Magazine
Our latest research on the challenges associated with malicious AI models has been published in the Communications of the ACM[...]
Read Post >
Advanced Security Research: The Paradigm of Hallucinations in AI-driven Cybersecurity Systems
Aryaka Threat Research Lab recently published an advanced AI research paper in the Elsevier Computer and Electrical Engineering (CAEE) journal[...]
Read Post >
Strela Stealer Malware Research: Tracing the Digital Footprint and Network Behavior
Strela Stealer, a sophisticated information-stealing malware, is designed to exfiltrate sensitive user credentials, primarily targeting email and web browser data.[...]
Read Post >
Snake Infostealer: A Look into Data Exfiltration via SMTP
Data exfiltration via Simple Mail Transfer Protocol (SMTP) is a robust method attackers use to transfer sensitive or confidential information[...]
Read Post >
SaltTyphoon APT: Unified SASE as a Service to the Rescue
Overview Events like SaltTyphoon are an excellent reminder of enterprise and users’ susceptibility to breaches because of dependencies on infrastructure[...]
Read Post >
Disrupting The Attack Surface with Unified SASE as a Service by Deterring Malicious Communication
Resilient cybersecurity is a strategic approach that emphasizes the ability of an organization to withstand, adapt to, and recover from[...]
Read Post >
GenAI network acceleration requires prior WAN optimization
This article was originally published on HELP NET SECURITY As GenAI models used for natural language processing, image generation, and other complex[...]
Read Post >