FeatureThe Covid-19 threat landscape
Cited by (0)
About the authors
Dr Aditya K Sood is a senior director of threat research and security strategy in the Office of the CTO at F5. He has research interests in cloud security, IoT security, malware automation and analysis, application security and secure software design. Sood obtained his PhD from Michigan State University in computer sciences. He is also the author of the books Targeted Cyber Attacks and Empirical Cloud Security.
Srilekha Talluri is a software engineer at F5 Networks. She received her BE in computer science from BITS Pilani Hyderabad in 2020. She is a part of the Innovate F5 Project at F5 and is working on developing threat intelligence to mitigate various cyber attacks.
Amit Nagal is a principal data scientist at F5 Networks. He has more than 15 years of experience in machine learning and analytics. He holds a PhD degree in developmental science from MGS university. In the past he has worked at Verizon and JPMorgan Chase. Currently he is working on different projects in F5 where he is applying machine learning and artificial intelligence to threat and security research.
Ruthvik Reddy Sankepally is a software engineer at F5 Networks. He graduated with a BE degree in computer science from BITS Pilani Hyderabad. Since graduating, he has worked on Innovate F5 projects at F5 Networks on exploring and building solutions to cater to the needs of the rapidly changing threat landscape.
Bharathasimha Reddy Devarapally is a software engineer at F5 Networks. He received his bachelor's degree in computer science from the National Institute of Technology, Warangal (India) in 2020. He has been actively working on threat research at F5.
Rohit Chaturvedi works as a threat research and development engineer at F5 Networks. He holds a master's degree in cyber security and incident response. He has more than three years’ experience in the threat research domain. He is actively working with Innovate F5 projects and his areas of expertise are threat research and hunting, research blogs, signature writing and remediating threat attacks.