Aditya is a cybersecurity practitioner, researcher, and consultant with 18+ years of experience driving security across products and infrastructure. He specializes in aligning security with business value to enable growth and resilience. His interests include AI security, cloud security, malware automation and analysis, application security, and secure software design. He held positions such as Senior Director of Threat Research and Security Strategy, Head (Director) of Cloud Security, Chief Architect of Cloud Threat Labs, Lead Architect and Researcher, Senior Consultant, and others while working for companies such as F5 Networks, Symantec, Blue Coat, Elastica, IOActive, Coseinc, and KPMG.
At present, he is Vice President of Security Engineering and AI Strategy at Aryaka.
Techtarget (ComputerWeekly) Articles
Presentations and Documents
Published Research Whitepaper
This book explores the evolving AI threat landscape, including risks in LLMs, GenAI, and AI infrastructure.
This cloud security book focuses on real-world attack scenarios, risk assessment, and proven methods to prevent data breaches.
Designed for cloud and security practitioners, this book delivers hands-on strategies to evaluate and secure cloud environments.
Contributor
Contributor
Contributor
Book Reviewer
Easy Prey Podcast
DW Business Beyond
Pacific Hackers 2024
Pacific Hackers 2024
APWG eCrime 2022
Govware 2022
Virus Bulletin 2021
Texas Cyber Security 2021
Hack in Paris 2021
Pacific Hackers 2020
BSides SF 2018
ToorCon 2018
HOPE 2018
DEF CON 26
DEF CON 25
BlackHat / OWASP
Layerone 2012
GrrCon 2012
HOPE 2012
Strafer: Ransomware Detection in Elasticsearch
Enfilade: Ransomware Detection in MongoDB
Melee: Ransomware Detection in MySQL
Sparty: Assessing Security of Sharepoint
Reported many vulnerabilities to vendors as a part of bug bounties (entirely fun). The list of vendors are presented below but are not limited to:
Albert Einstein
Stephen Hawking
Season 8, Episode 22 - Baltimore.
Lou Holtz