Tim Wade

Deputy Chief Technology Officer

Tim Wade is the Deputy Chief Technology Officer of Vectra and is an advocate for thoughtful protections of individual privacy, fairness, and liberty in our modern digital world. Previously, he held the position of Head of Application and Information Security at Bridgepoint Education, Inc. Tim joined Bridgepoint from his prior life in the U.S. Federal Sector, threading through engineering, architecture, and operational security roles grown from a career that began as a uniformed member of the United States Air Force. Tim holds a M.S. in Computer Science from the University of Southern California and maintains industry credentials issued by Offensive Security and (ISC)2.

Posts from

Tim Wade

April 26, 2022
|
By
Tim Wade
New Data Suggest It’s Time to Change the Way Organizations Deal with Cyberattacks

Vectra’s latest report on cybersecurity shows: Traditional approaches won’t work anymore. Key findings are listed here.

Read More
January 20, 2022
|
By
Tim Wade
Assume Compromise: It's time to change your security mentality

With ransomware attacks continuing to dominate media headlines, it’s clear that a security approach centered on prevention no longer suffices. A shift towards an ‘assume compromise’ security approach prepares your business to deal with the intensity and frequency of today’s ransomware attacks. To that end, advanced detection and response capabilities play a crucial role. In this blog, you will also learn why a large British multinational insurance company chose Vectra, Wipro’s Venture Partner, to meet its security needs.

Read More
August 17, 2021
|
By
Tim Wade
How Security Experts are Surviving Cloud Transformation

Hear cloud security experts from Splunk and Vectra explain how digital transformation has drastically changed security and why organizations need to adapt.

Read More
June 14, 2021
|
By
Tim Wade
Detecting Attackers as They Head Towards Your Money

What makes threat detection so challenging? We answer that question and provide the expert insight around our latest Spotlight Report—Vision and Visibility: Top 10 Threat Detections for Microsoft Azure AD and Office 365.

Read More
June 2, 2021
|
By
Tim Wade
Is the Cloud Control Plane a New Frontline in Cybersecurity?

As cloud adoption continues to accelerate, the evolution of the next generation of modern attacks will traverse through and towards an enterprise’s cloud control plane. Learn why this risk should not be underestimated.

Read More
May 17, 2021
|
By
Tim Wade
Here We Go Again....One Week After the Colonial Pipeline Attack, More Ransomware

Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.

Read More
March 24, 2021
|
By
Tim Wade
Today’s Security Forecast: Cloudy with a Chance of Account Takeovers

Account takeovers and identity-based attacks are on the rise, with Microsoft Office 365 at the heart of these threats. Find out what concerns are top of mind for IT decision makers when it comes to Office 365 security and protecting data in the cloud.

Read More
March 15, 2021
|
By
Tim Wade
Office 365 and Cloud Security Insights: Reasons for Optimism Despite Risks

Despite 71% of organizations suffering malicious SaaS account takeover, 90% are still accelerating cloud adoption. Surprising? Maybe not – read on as this blog distills the takeaways from mid-sized and large Office 365 enterprises.

Read More
February 22, 2021
|
By
Tim Wade
3 Guideposts for Organizational Security

Security leaders need to measure success, but too often the exercise focuses more on the absence of failure than the presence of success. Here’s three practical guideposts to achieve meaningful organizational security.

Read More
September 1, 2020
|
By
Tim Wade
Can Data Science Identify Insider Threats?

The problem of detecting an insider threat before it happens is difficult to solve as the prediction of human behavior itself. Discover how applying a data science approach to detection can reveal clues to catch know and unknown attackers across your enterprise.

Read More
August 3, 2020
|
By
Tim Wade
Ferret Out a RAT: Don’t Just Build a Better Mousetrap

Learn why using AI models to look for the communication pattern of a RAT in network data, can help detect them in real-time with high-fidelity based on the behavior observed.

Read More
July 20, 2020
|
By
Tim Wade
Security Limitations of IOCs—Lessons Learned from APT29

What the recent advanced threat actor 29 shows about the security limitations of indicator of compromise and how you can defend against privileged access attacks.

Read More