Security
Security Insights
Filter by Content Types
- No options
1173 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•May 14, 2026 • 10am
Security & Shades: Helping you Protect Yourself from Cyber Threats and UV Rays.
Join WWT, Silverfort, Concentric AI, and Horizon3 AI for a cybersecurity dinner featuring a panel of industry experts discussing the rapidly evolving landscape of Identity, Data, and threat managment. This high‑level conversation is designed to spark meaningful dialogue, share real‑world perspectives, and answer your most pressing questions in today's shifting landscape.
Enjoy a curated dinner experience at Truluck's in Rosemont, with each participant also receiving a $150 Sunglass Hut gift card. This intimate evening will give you the opportunity to connect with peers, gain fresh insights from practitioners, and explore practical approaches to strengthening your organization's security posture.
Experience
•Apr 23, 2026 • 3:30pm
WWT Innovation Vendor Spotlight - 7AI
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with 7AI - a leader in agentic AI security for security operations.
7AI customers trust dynamic AI agents to get security work done at scale. The company's AI agents autonomously investigate security alerts, proven in production at Fortune 500 scale, eliminating the work humans shouldn't be doing so security teams can finally do human work: strategic threat hunting, proactive defense, and the work that actually protects organizations.
Experience
•Apr 22, 2026 • 11am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Apr 16, 2026 • 9am
Why Storage, Security and Data Readiness Now Decide AI Success
AI success now depends on whether your enterprise foundation is actually ready. Recorded live at NVIDIA GTC, this episode of the AI Proving Ground Podcast features WWT AI leader Mike Trojecki and Everpure VP of AI and Analytics Kaycee Lai discussing why business outcomes, secure data access, low-latency infrastructure, governance and storage architecture are becoming the real differentiators as organizations try to operationalize AI at scale.
Video
•1:36
•Mar 31, 2026
How to Scale Agentic AI Without Losing Control
AI is moving out of prototype mode and into production. In this episode of the AI Proving Ground Podcast, recorded live at NVIDIA GTC, leaders from Cisco, NVIDIA and WWT unpack the real job in front of enterprise executives: how to scale agentic AI, secure AI factories, manage token economics and prepare infrastructure for an inference-heavy future.
Video
•5:10
•Mar 30, 2026
Cisco AI Defense CTF
LIVE SCOREBOARD - https://atc-progress-tracker.apps.wwtatc.com/score-board/v2/6994c52f709e01fd79ba619d/large-format?isOnDemandEvent=true
Join us for Cisco AI Defense, an interactive Capture the Flag (CTF) experience designed to showcase how Cisco is securing the future of GenAI.
This is a single player CTF, which will be open for 72 hours. We will have a shared scoreboard. Should players finish with equal scores, final placement will be awarded to the player who achieved their last correct submission in the least amount of time from their first submission.
Powered by our advanced Cyber Range platform, this immersive simulation challenges participants to exploit and defend against real-world AI vulnerabilities — including prompt injection, jailbreaking, and misuse of generative models. You'll see firsthand how Cisco's AI Defense identifies and mitigates these threats in real time.
Experience
•Mar 30, 2026 • 9am
Your Recovery Plan Won't Work in a Cyberattack
It starts with a few phones buzzing. Then every screen locks. In that moment, most organizations realize something they didn't plan for. The systems they trusted to recover the business were built for the wrong kind of crisis. In this episode of WWT Presents Research, Robb Boyd and WWT cyber resilience expert Doug Wong unpack the critical gap between disaster recovery and cyber recovery. While traditional recovery assumes you can fail over and keep running, cyberattacks force a far more disruptive reality. Networks are shut down, systems are isolated and the path back isn't a switch, it's a rebuild.
Video
•1:57
•Mar 30, 2026
The Cloud Identity Crisis
In 2025, attackers shifted focus to credential harvesting and identity-based attacks, exploiting the surge in non-human identities (NHIs) in cloud environments. As NHIs outnumber human identities, organizations face increased risks. Effective identity governance, including Just-in-Time access and automation, is crucial for robust cloud security and minimizing operational exposure.
Blog
•Mar 27, 2026
How the "Stryker" Intune Wipe Incident Highlights a Critical Gap in Endpoint Control
The "Stryker" incident highlights vulnerabilities in control plane design, leading to large-scale device wipes via Microsoft Intune. This case study emphasizes the need for layered safeguards, such as Workspace ONE's verification, segmentation and bulk action constraints, to prevent catastrophic outcomes. Architectural resilience, not just policy, is crucial for security.
Blog
•Mar 26, 2026
Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR
Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
•Mar 26, 2026 • 9am
WWT's Take on Fortinet Accelerate 2026
WWT's and Fortinet's partnership was showcased during Accelerate 2026.
Blog
•Mar 26, 2026