Oliver Tavakoli

Chief Technology Officer at Vectra AI

Oliver Tavakoli is chief technology officer at Vectra. Oliver is a technologist who has alternated between working for large and small companies throughout his 25-year career – he is clearly doing the latter right now. Prior to joining Vectra, Oliver spent more than seven years at Juniper as chief technical officer for the security business. Oliver joined Juniper as a result of its acquisition of Funk Software, where he was CTO and better known as developer #1 for Steel-Belted Radius. Prior to joining Funk Software, Oliver co-founded Trilogy Inc. and prior to that, he did stints at Novell, Fluent Machines and IBM. Oliver received an MS in mathematics and a BA in mathematics and computer science from the University of Tennessee.

All blog posts from this author

Cybersecurity

The Year in Review—and the Year to Come

November 30, 2020
Read blog post
Security operations

Office 365 Threats and Inversion of the Corporate Network

January 6, 2021
Read blog post
Security operations

Office 365の脅威と企業ネットワークの逆転

January 6, 2021
Read blog post
Artificial Intelligence

Why it's okay to be underwhelmed by Cisco ETA

June 26, 2017
Read blog post
Breach

Detecting Future Heartbleed Security Exploits

August 22, 2014
Read blog post
Breach

Art of Scoring Malware Detections – Friend or Foe?

August 15, 2014
Read blog post
Breach

Security Report Season: what malware does versus what it is.

April 2, 2014
Read blog post
Breach

Heartbleed on the Inside

May 2, 2014
Read blog post
Breach

Divining Attacker Intent

April 17, 2014
Read blog post
Cybersecurity

Es ist in Ordnung, sich von Cisco ETA nicht beeindrucken zu lassen

June 29, 2017
Read blog post
Threat detection

Don't Shed Tears When Peeling the Onion Router

November 11, 2014
Read blog post
Breach

Catch Attackers Attempting to Shellshock You

September 29, 2014
Read blog post

Oliver Tavakoli

Chief Technology Officer at Vectra AI

Oliver Tavakoli is chief technology officer at Vectra. Oliver is a technologist who has alternated between working for large and small companies throughout his 25-year career – he is clearly doing the latter right now. Prior to joining Vectra, Oliver spent more than seven years at Juniper as chief technical officer for the security business. Oliver joined Juniper as a result of its acquisition of Funk Software, where he was CTO and better known as developer #1 for Steel-Belted Radius. Prior to joining Funk Software, Oliver co-founded Trilogy Inc. and prior to that, he did stints at Novell, Fluent Machines and IBM. Oliver received an MS in mathematics and a BA in mathematics and computer science from the University of Tennessee.

Posts from

Oliver Tavakoli

January 6, 2021
|
By
Oliver Tavakoli
Office 365 Threats and Inversion of the Corporate Network

The number of threats targeted towards Office 365 users and other similar platforms will undoubtedly continue to grow in 2021. Learn from our CTO, Oliver Tavakoli, what your company can do to prepare for the rise of targeted SaaS threats in 2021.

Read More
January 6, 2021
|
By
Oliver Tavakoli
Office 365の脅威と企業ネットワークの逆転

Office365ユーザーやその他の類似プラットフォームを標的とした脅威の数は、2021年も増加し続けることは間違いありません。SaaSを使うことから生まれるリスクへの回避方法をVectraAI社のCTO OliverTavakoliが解説します。

Read More
November 30, 2020
|
By
Oliver Tavakoli
The Year in Review—and the Year to Come

Vectra CTO Oliver Tavakoli looks back on a disruptive 2020 and shares his view of what 2021 holds for security practices.

Read More
June 26, 2017
|
By
Oliver Tavakoli
Why It's Okay to Be Underwhelmed by Cisco ETA

Cisco recently announced the term “intent-based networking” in a press release that pushes the idea that networks need to be more intuitive. One element of that intuition is for networks to be more secure without requiring a lot of heavy lifting by local network security professionals.

Read More
May 2, 2014
|
By
Oliver Tavakoli
Heartbleed on the Inside

Learn why Heartbleed can have longer term implications and why it may be just a matter of time before we see targeted attacks that utilize Heartbleed as one of the weapons in the attackers' arsenal to acquire key account credentials and use those credentials to get to the crown jewels.

Read More