Security
Security Insights
Filter by Content Types
- No options
1191 results found
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Jan 15, 2026 • 9am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Dec 11, 2025 • 9am
Hands-On Lab Workshop: Zscaler Unified Vulnerability Management
Join our interactive lab workshop to explore Zscaler's Unified Vulnerability Management (UVM) and Risk360 modules. This session is designed for security and IT professionals seeking to enhance their organization's asset hygiene, vulnerability management, and cyber risk quantification. You'll gain hands-on experience with Zscaler's Security Fabric, learning how to identify and prioritize vulnerabilities, deduplicate findings, and streamline remediation workflows. The workshop includes practical exercises, expert guidance, and live Q&A to help you master modern vulnerability management strategies.
Webinar
•Nov 20, 2025 • 11am
CrowdStrike CTF: Falcon
THIS EVENT IS FULL. THERE IS ANOTHER CROWDSTRIKE CTF ON 12/11/25 https://www.wwt.com/event/68d1ac9cbaf9d222fb566686
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Nov 20, 2025 • 10am
WWT Innovation Vendor Spotlight - Vega Security
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with Vega Security a leader in security operation solutions.
Vega Security addresses the challenges enterprises face in centralizing security data and the limitations of traditional SIEM solutions. Vega's approach focuses on a federated, distributed model that allows customers to maintain control over their data while providing a flexible, cost-effective security analytics platform. Vega aims to solve the problem of data fragmentation in large organizations by providing a single console to access and query data from various sources like MS Sentinel, Elastic, CRWD, Databricks Okta, S3, Snowflake and more.
Further information can be found at: https://vega.io/
Date: November 19th, 2025
Time: 12:00 PM – 1:00 PM EST
Location: Virtual
Agenda:
* Introductions (5 min)
* WWT SecOps Security Practice Overview (10 min)
* Vega Security Presentation (30-45 min)
* Q&A (15 min)
Experience
•Nov 19, 2025 • 11am
Why Cybersecurity Jobs Are Likely To Resist AI Layoff Pressures: Experts
While AI-driven automation seems poised to disrupt nearly all parts of the workforce, security analysts are poised to be a rare exception, cybersecurity experts tell CRN.
News
•Nov 14, 2025
Partner POV | Hexstrike-AI: When LLMs Meet Zero-Day Exploitation
Hexstrike-AI, a revolutionary AI-powered security framework, is rapidly repurposed by threat actors to exploit zero-day vulnerabilities, reducing attack time from days to minutes. This marks a pivotal shift in cyber operations, urging defenders to adopt adaptive AI-driven defenses and shorten patch cycles to counteract this emerging threat.
Partner Contribution
•Nov 13, 2025
SentinelOne OneCon 2025: Redefining the Future of AI-Driven Security
SentinelOne isn't afraid to take on the hard problems. Too often, as practitioners, we are faced with having to make concessions in our security program for the sake of waiting on our OEM of choice to innovate, acquire or deliver on feature-rich promises over the years of our contract terms. If there is one thing that 2025 has taught me is that SentinelOne is facing those head-on.
Blog
•Nov 12, 2025
Partner POV | Why Observability at the Edge Is Becoming a Boardroom Priority
In a digital era where edge environments are pivotal, remote site monitoring emerges as a strategic necessity. As organizations expand into decentralized infrastructures, ensuring robust visibility and performance at the edge becomes crucial. NETSCOUT's solutions offer real-time insights, safeguarding service quality and business resilience in an increasingly complex landscape.
Partner Contribution
•Nov 12, 2025
Cribl for Security: The Control Plane for AI's Data Tsunami
AI doesn't just generate insights — it generates data chaos. Cribl brings control back to the pipeline with selective capture, policy-first governance and search-in-place, turning AI exhaust into operational advantage.
Blog
•Nov 11, 2025
Partner POV | AI at the Edge: the Forescout 4D Platform™ Meets NVIDIA BlueField
AI-driven cybersecurity is revolutionizing industrial operations by transforming vast data into actionable insights. Forescout's 4D Platform™, powered by NVIDIA, offers on-premises AI solutions, ensuring real-time threat detection and resilience without cloud dependency. This integration empowers security teams to efficiently manage critical environments, enhancing protection and operational continuity.
Partner Contribution
•Nov 11, 2025
Partner POV | One Smart Question – How Can AI and ML Protect Your Firewall and Security Stack?
Learn how AI powered DDoS threat intelligence and threat analysis can protect your firewall and security stack with Mike Wetherbee, Senior Product Marketing Manager at NETSCOUT. What makes AI powerful is how you use it. NETSCOUT Arbor DDoS protection combines AI with decades of security expertise, unmatched mitigation technology, and real -time global DDoS attack visibility.
Video
•2:01
•Nov 11, 2025