Deputy Chief Technology Officer
Tim Wade is the Deputy Chief Technology Officer of Vectra and is an advocate for thoughtful protections of individual privacy, fairness, and liberty in our modern digital world. Previously, he held the position of Head of Application and Information Security at Bridgepoint Education, Inc. Tim joined Bridgepoint from his prior life in the U.S. Federal Sector, threading through engineering, architecture, and operational security roles grown from a career that began as a uniformed member of the United States Air Force. Tim holds a M.S. in Computer Science from the University of Southern California and maintains industry credentials issued by Offensive Security and (ISC)2.
Posts from
Tim Wade
Vectra’s latest report on cybersecurity shows: Traditional approaches won’t work anymore. Key findings are listed here.
With ransomware attacks continuing to dominate media headlines, it’s clear that a security approach centered on prevention no longer suffices. A shift towards an ‘assume compromise’ security approach prepares your business to deal with the intensity and frequency of today’s ransomware attacks. To that end, advanced detection and response capabilities play a crucial role. In this blog, you will also learn why a large British multinational insurance company chose Vectra, Wipro’s Venture Partner, to meet its security needs.
Hear cloud security experts from Splunk and Vectra explain how digital transformation has drastically changed security and why organizations need to adapt.
What makes threat detection so challenging? We answer that question and provide the expert insight around our latest Spotlight Report—Vision and Visibility: Top 10 Threat Detections for Microsoft Azure AD and Office 365.
As cloud adoption continues to accelerate, the evolution of the next generation of modern attacks will traverse through and towards an enterprise’s cloud control plane. Learn why this risk should not be underestimated.
Just a week after the Colonial Pipeline was shut down due to ransomware—attackers are at it again. It’s now being reported that Ireland’s health service shut down its IT systems and a company in Germany had to fork out a $4.4 million ransom on the same day.
Account takeovers and identity-based attacks are on the rise, with Microsoft Office 365 at the heart of these threats. Find out what concerns are top of mind for IT decision makers when it comes to Office 365 security and protecting data in the cloud.
Despite 71% of organizations suffering malicious SaaS account takeover, 90% are still accelerating cloud adoption. Surprising? Maybe not – read on as this blog distills the takeaways from mid-sized and large Office 365 enterprises.
Security leaders need to measure success, but too often the exercise focuses more on the absence of failure than the presence of success. Here’s three practical guideposts to achieve meaningful organizational security.
The problem of detecting an insider threat before it happens is difficult to solve as the prediction of human behavior itself. Discover how applying a data science approach to detection can reveal clues to catch know and unknown attackers across your enterprise.
Learn why using AI models to look for the communication pattern of a RAT in network data, can help detect them in real-time with high-fidelity based on the behavior observed.
What the recent advanced threat actor 29 shows about the security limitations of indicator of compromise and how you can defend against privileged access attacks.
General: info@vectra.ai
Support: support@vectra.ai
Headquarters
550 S. Winchester Blvd., Suite 200
San Jose, CA, USA 95128
© 2022 Vectra AI, Inc. All rights reserved.