Experience Aryaka's Unified SASE as a Service. Take The Interactive Tour >>

Aryaka Blog Author

Blog Home > Author > Aditya K Sood

Aditya K Sood

VP of Security Engineering and AI Strategy

Aditya K Sood (Ph.D) is the VP of Security Engineering and AI Strategy at Aryaka.. With more than 16 years of experience, he provides strategic leadership in information security, covering products and infrastructure. Dr. Sood is interested in Artificial Intelligence (AI), cloud security, malware automation and analysis, application security, and secure software design. He has authored several papers for various magazines and journals, including IEEE, Elsevier, Crosstalk, ISACA, Virus Bulletin, and Usenix. He has been an active speaker at industry conferences and presented at Blackhat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP, and many others. Dr. Sood obtained his Ph.D. in Computer Sciences from Michigan State University. Dr. Sood is also an author of the "Targeted Cyber Attacks" and “Empirical Cloud Security” books. He held positions such as Senior Director of Threat Research and Security Strategy, Head (Director) of Cloud Security, Chief Architect of Cloud Threat Labs, Lead Architect and Researcher, and others while working for companies such as F5 Networks, Symantec, Blue Coat, Elastica, and KPMG.

Read Blogs by Aditya K Sood

蝙蝠影:越南威胁行动者扩大其数字行动
By Aditya K Sood | By Varadharajan K | Sept 25, 2025 获取...[...]
Read Post >
Wiley 的《互联网技术快报》发表了关于用于自适应威胁猎杀的生成式人工智能的研究成果
最近,我们在Wiley 的《互联网技术通讯》(Internet Technology Letters)上发表了...[...]
Read Post >
朝鲜的 Kimsuky APT:适应不断发展的数字世界的隐形威胁
作者:Aditya K Sood | 作者:Varadharajan K |2025 年 7 月 29 日 在...[...]
Read Post >
ACM 通信》杂志发布高级人工智能安全研究成果
我们关于恶意人工智能模型相关挑战的最新研究发表在《ACM 通信》杂志上,题为 “恶意人工智能模型破...[...]
Read Post >
蛇形信息窃取器了解通过 SMTP 进行的数据外泄
通过简单邮件传输协议(SMTP)进行数据外渗是攻击者用来将敏感或机密信息从被入侵系统传输到外部位置的一种有效方...[...]
Read Post >
SaltTyphoon APT:统一 SASE 作为一种服务提供救援
概述 像 SaltTyphoon 这样的事件是一个极好的提醒,提醒企业和用户由于依赖于可能不在其控制范围内的基...[...]
Read Post >
利用统一 SASE 即服务阻止恶意通信,破坏攻击面
弹性网络安全是一种战略方法,强调组织抵御、适应网络威胁和攻击并从中恢复的能力。弹性网络安全态势超越了传统的防御...[...]
Read Post >
GenAI 网络加速需要事先进行广域网优化
本文最初发布于HELP NET SECURITY 由于用于自然语言处理、图像生成和其他复杂任务的GenAI 模...[...]
Read Post >