Ashish Popli

FOUNDER & CEO

Engineer. Red Teamer. Security Leader. Investor. Builder.

I started on the offensive side. Red teaming, breaking into systems, learning that exploitability depends on conditions, not just presence. That instinct stayed with me through years of security engineering and vulnerability management at enterprise scale, and through building ML systems that detect patterns in noisy data at massive volume.

Then I became the buyer. Three CISO roles, building security programs from zero at companies growing from early revenue through IPO. The gap between what tools report, what analysts can investigate, and what's actually exploitable never closed. Log4J made it visceral. War room open, five teams demanding answers simultaneously, leadership asking for blast radius, engineers asking if their service is affected, and security scrambling to check conditions across hundreds of resources manually.

Investing in and advising 10+ security startups taught me how startups fit into the larger ecosystem, what problems are worth building companies around, and what it takes to be a founder.

Then classical ML, generative AI, and graph modeling caught up with the problem. A career building security tools and ML systems taught me that vulnerability management isn't an operations challenge. It's a product problem. Defendermate is that product, built for the post-AI era.

Read the full story

The Team

People who have lived the pain and joy of working on these topics. Biased for action.

Exploitation Intelligence

Vulnerability research, exploit analysis, OSINT synthesis. Translating advisories and PoC code into structured, verifiable exploitation conditions.

Cloud Security Engineering

Agentless probing, platform-native access patterns, security group modeling, identity chain traversal. AWS, Azure, Kubernetes at scale.

Graph Modeling & Attack Simulation

Infrastructure as graph. Attack technique chains, consequence chaining, exposure analysis, blast radius computation, what-if simulation.

AI & Multi-Agent Systems

Classical ML for condition extraction. Generative AI for intelligence synthesis. Multi-agent investigation architecture grounded in verified data.

Backend & SaaS Infrastructure

Production SaaS at scale. Event-driven architectures, real-time data pipelines, CI/CD, observability. Built to ship fast and run reliably.

Security Practitioner

People who understand the pain of CISOs, security engineers, and platform teams firsthand. Building for practitioners because we've been practitioners.

If you fit any of the above, we're always open to a conversation. Reach out

OUR INVESTORS

Trusted by the best in business

Our investors include top-tier venture capital firms and seasoned industry
leaders from North America, Europe & Asia