Security
Security Insights
Filter by Content Types
- No options
1170 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Dec 11, 2025 • 9am
Hands-On Lab Workshop: Zscaler Unified Vulnerability Management
Join our interactive lab workshop to explore Zscaler's Unified Vulnerability Management (UVM) and Risk360 modules. This session is designed for security and IT professionals seeking to enhance their organization's asset hygiene, vulnerability management, and cyber risk quantification. You'll gain hands-on experience with Zscaler's Security Fabric, learning how to identify and prioritize vulnerabilities, deduplicate findings, and streamline remediation workflows. The workshop includes practical exercises, expert guidance, and live Q&A to help you master modern vulnerability management strategies.
Webinar
•Nov 20, 2025 • 11am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Nov 20, 2025 • 10am
WWT Innovation Vendor Spotlight - Vega Security
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with Vega Security a leader in security operation solutions.
Vega Security addresses the challenges enterprises face in centralizing security data and the limitations of traditional SIEM solutions. Vega's approach focuses on a federated, distributed model that allows customers to maintain control over their data while providing a flexible, cost-effective security analytics platform. Vega aims to solve the problem of data fragmentation in large organizations by providing a single console to access and query data from various sources like MS Sentinel, Elastic, CRWD, Databricks Okta, S3, Snowflake and more.
Further information can be found at: https://vega.io/
Date: November 19th, 2025
Time: 12:00 PM – 1:00 PM EST
Location: Virtual
Agenda:
* Introductions (5 min)
* WWT SecOps Security Practice Overview (10 min)
* Vega Security Presentation (30-45 min)
* Q&A (15 min)
Experience
•Nov 19, 2025 • 11am
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Nov 13, 2025 • 9am
🚩Disarm Me CTF: Hack, Decrypt, Disable
This red team–style CTF puts your team in the role of attackers breaking into an emulated internal network. You'll play as contracted gray-hat operatives (SAVE) infiltrating The League — a shadowy collective behind ransomware and extortion campaigns — to recover intelligence and disrupt their plans.
Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights.
What you'll practice:
🔍 Attacker tradecraft — reconnaissance, exploitation, persistence.
🧠 Adversary tool fluency — exposure to real-world tools and methods.
🤝 Critical thinking & communication — operate as a focused squad under timed pressure.
🗂️ Side quests & extra intelligence — optional objectives that surface richer findings for your organization.
Cyber Range
•Nov 6, 2025 • 9am
Strategic Planning for Post-Quantum Cryptography with WWT and Palo Alto Networks
Join World Wide Technology and Palo Alto Networks experts for an engaging virtual event focused on preparing your organization for the quantum era. Discover the latest insights on post-quantum cryptography (PQC), learn about the risks of "harvest now, decrypt later" attacks, and understand why being PQC ready is critical for long-term data protection and regulatory compliance. Our experts will discuss industry trends, customer challenges, and practical strategies for building crypto agility, ensuring a smooth transition to new standards. Gain actionable guidance to future-proof your security posture and maintain resilience against evolving threats.
Webinar
•Oct 30, 2025 • 9am
Check Point and the Post-Quantum Transition
Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025
Cyber Recovery and Data Protection
WWT's Dominic Greco discusses WWT's high level approach to Cyber Recovery and lessons to be learned in Cyber Recovery.
Video
•4:00
•Oct 29, 2025
How AI Agents Are Transforming IT Ops
AI agents are moving from hype to the heart of enterprise IT. In this episode of the AI Proving Ground Podcast, Eric Jones and Ruben Ambrose — two leading AI experts — explore how intelligent, human-guided systems are transforming IT service management, incident response and operational scale to deliver faster resolutions, stronger security and smarter decisions across the enterprise.
Video
•1:38
•Oct 28, 2025
From Edge to Core: Securing AI Infrastructure with WWT's ARMOR Framework & NVIDIA BlueField-4
As AI transforms the enterprise landscape, infrastructure must advance to meet demands for performance, security, scalability and resilience. At NVIDIA GTC Washington, D.C., 2025, the launch of NVIDIA BlueField-4 marks a pivotal moment in infrastructure innovation. With 6x the compute power of NVIDIA BlueField-3 and 800 Gb/s throughput, BlueField-4 is engineered for gigascale AI factories, enabling secure, high-performance computing from the edge to the core.
Blog
•Oct 28, 2025
The Journal Record's 2025 Woman of the Year
World Wide Technology's Madison Horn was one of 56 women celebrated in Tulsa for impactful leadership in their professions and their communities during the 45th annual event.
News
•Oct 28, 2025