Nitesh Dhanjani

Nitesh Dhanjani

Author, Speaker

  • @nitesh_dhanjani

Areas of Expertise:

  • IT strategy
  • security strategy
  • application security strategy
  • ethical hacking
  • cloud computing
  • virtualization
  • IoT
  • Internet of Things
  • consulting
  • speaking
  • training
  • writing

Nitesh Dhanjani is a well known security researcher, author, and speaker. Dhanjani is the author of "Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts" (O'Reilly), “Hacking: The Next Generation” (O’Reilly), “Network Security Tools: Writing, Hacking, and Modifying Security Tools” (O’Reilly) and “HackNotes: Linux and Unix Security” (Osborne McGraw-Hill). Dhanjani has been invited to talk at various information security events such as the Black Hat Briefings, RSA, Hack in the Box, Microsoft Blue Hat, and the NSTAC committee. Dhanjani's work has been reported by large media outlets such as CNN, Reuters, MSNBC, and Forbes.

Dhanjani is currently Executive Director at a large consulting firm where he advises executives at the largest corporations around the world on how to establish and execute multi-million dollar cyber security programs. Dhanjani is also responsible for evangelizing brand new technology service lines around emerging technologies and trends, including IoT, Big Data, Cloud, and Mobile security.

Dhanjani graduated from Purdue University with both a Bachelors and Masters degree in Computer Science.

Dhanjani's personal blog is located at dhanjani.com. You can follow him on Twitter here: @nitesh_dhanjani

Abusing the Internet of Things Abusing the Internet of Things
by Nitesh Dhanjani
April 2015
Ebook: $42.99

Hacking: The Next Generation Hacking: The Next Generation
by Nitesh Dhanjani, Billy Rios, Brett Hardin
September 2009
Print: $39.99
Ebook: $31.99

Network Security Tools Network Security Tools
by Nitesh Dhanjani, Justin Clarke
April 2005
Print: $34.95
Ebook: $27.99

Webcast - Psychotronica: Abusing and Leveraging Intelligence from Social Networking
September 29, 2009
In this presentation, we will go beyond discussing the obvious security and privacy implications of social media. We will tie the items of discussion to privacy implications as well as how they can be leveraged for investigations as well as business ...

"It says everything it should without the endless repeating and rephrasing so that readers would understand the concept, because it was so clearly explained the first time. This is a book that will get and keep your attention, and a must-read book for everyone dealing with computer and information security."
--Zeljka Zorz, Help Net Security

"I'd really recommend Hacking: The Next Generation to my fellow techies. More important than learning new ways to mess with each other's minds, it will expose you to a number of new attack vectors that you may not have considered. And in most cases, simple awareness of those new vectors is enough to allow you to start to defend against them. "
--Thomas Duff, Duffbert's Random Musings