chat
expand_more

Abnormal Engineering Stories #7: Understanding the Role of the CTO

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.
December 16, 2021

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.

After 20+ years as an operator, Tim has joined Menlo Ventures as an Investment Partner, a position that lends itself nicely to his obsession with dabbling in different types of technologies and problem-solving. He invests in a variety of fields including cybersecurity, cloud, AI/ML, dev ops, deep tech, and quantum computing. During our conversation, Tim and I discuss:

  • The role of the CTO and the responsibilities that come with the title
  • The benefits of being a CTO who still codes
  • Solving people problems with empathy and why leadership doesn't always fit into a framework
  • Recent technology trends Tim has seen as an investor

We hope you enjoy it! Please do subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories #7: Understanding the Role of the CTO

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B Flux Panel Ecommerce Checkout Hijacking via Phishing
FluxPanel turns legitimate ecommerce checkouts into live data theft operations. Learn how this dark web tool works, the role phishing plays, and how to stop attacks at their source.
Read More
B Fin Serv Attack Trends Blog
Email attacks on financial services rose 25% year-over-year. Learn why FinServ is a top target and how threat actors exploit trust to deceive employees.
Read More
B Flask Phishing Kit
Learn how threat actors used Flask, a popular Python framework, to build a versatile phishing kit for evasive campaigns that bypass traditional defenses.
Read More
B-Trust Trap Social Engineering Blog
The psychology of the modern work environment has become a roadmap for attackers—and a blind spot for traditional email security.
Read More
B VEC Employee Engagement Threat Report Blog 1
New research reveals that employees engage with 44% of read vendor email compromise attacks. See which industries and roles are most vulnerable to this threat.
Read More
B 1500x1500 MKT889c Forrester Wave
Abnormal AI received the highest scores possible in the Innovation and Roadmap criteria, the top score in the Strategy category, and above-average customer feedback.
Read More