Security
Security Insights
Filter by Content Types
- No options
1183 results found
Speed & Security Networking Event
This is not a sales pitch. There are no slides, no demos, and no quotas. Just a chance to spend time with your peers in the Arizona security and networking community, swap ideas, share challenges, and build the kind of relationships that actually move the needle.
We're taking over Roadrunner Sports for the night — so come ready to get fitted for a fresh pair of kicks on us, enjoy some great food, and talk shop (or don't) with some of the sharpest minds in the industry.
What to expect:
A complimentary pair of shoes, fitted by the Roadrunner Sports team
Food and drinks throughout the evening
Relaxed, peer-to-peer networking with no agenda
Great company from across the Arizona tech and security community
Spots are limited — this is a small, intentional gathering, and we want the right people in the room.
Come for the shoes. Stay for the conversations.
Experience
•Jun 11, 2026 • 5pm
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•May 14, 2026 • 10am
Hands-On Lab Workshop: Cisco AI Defense
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed to challenge and sharpen your AI security skills. The Cisco AI Defense CTF lab puts you in the middle of real-world AI threat scenarios, where you will exploit and defend against vulnerabilities including prompt injection, jailbreaking, and misuse of generative AI models. Watch Cisco AI Defense technology intercept and neutralize attacks in real time as you work through progressively challenging scenarios. This lab goes beyond surface-level awareness—giving you direct, practical experience with the tools and techniques used to secure enterprise AI environments.
Webinar
•May 7, 2026 • 11am
Security & Shades: Helping you Protect Yourself from Cyber Threats and UV Rays.
Join WWT, Silverfort, Concentric AI, and Horizon3 AI for a cybersecurity dinner featuring a panel of industry experts discussing the rapidly evolving landscape of Identity, Data, and threat managment. This high‑level conversation is designed to spark meaningful dialogue, share real‑world perspectives, and answer your most pressing questions in today's shifting landscape.
Enjoy a curated dinner experience at Truluck's in Rosemont, with each participant also receiving a $150 Sunglass Hut gift card. This intimate evening will give you the opportunity to connect with peers, gain fresh insights from practitioners, and explore practical approaches to strengthening your organization's security posture.
Experience
•Apr 23, 2026 • 3:30pm
WWT Innovation Vendor Spotlight - 7AI
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with 7AI - a leader in agentic AI security for security operations.
7AI customers trust dynamic AI agents to get security work done at scale. The company's AI agents autonomously investigate security alerts, proven in production at Fortune 500 scale, eliminating the work humans shouldn't be doing so security teams can finally do human work: strategic threat hunting, proactive defense, and the work that actually protects organizations.
Experience
•Apr 22, 2026 • 11am
How UAE-Based Core42 is Rethinking AI Infrastructure From the Ground Up
How do you build an AI environment the business can scale, security can defend, regulators can accept and teams can actually use? In this episode of the AI Proving Ground Podcast, Core42 CTO Raghu Chakravarthi and WWT EVP Kraig Ecker discuss why sovereignty extends beyond data residency, heterogeneous infrastructure is becoming non-negotiable and why agents will sharply increase the need for observability, security guardrails and scalable inference design.
Video
•4:28
•Apr 14, 2026
AI Agent Security Needs a Control Plane, Not Just a Sandbox
The first wave of AI agents proved they can work. The next wave will be defined by whether enterprises can govern what those agents can access, install and do.
Blog
•Apr 13, 2026
Partner POV | Building a Self-Defending Ecosystem with Zscaler Deception
Modern Security Operations Centers (SOCs) are overwhelmed by a constant flood of data. In this environment, reactive security isn't just inefficient—it's a liability. A truly proactive strategy requires two things: unambiguous, high-fidelity signals and the automated ability to act on them instantly.
Partner Contribution
•Apr 13, 2026
Partner POV | Key Findings: 2026 ThreatLabz VPN Risk Report
The Zscaler ThreatLabz 2026 VPN Risk Report highlights a critical mismatch: while AI has accelerated the speed of cyberattacks, traditional VPN visibility and patch cycles remain dangerously slow. "Good enough" security is no longer sufficient when adversaries scale at machine speed.
Partner Contribution
•Apr 13, 2026
ATC+
Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate
Once you've mastered the basics of Palo Alto's NGFW with the fundamentals Learning Path, it's time to continue your education with the intermediate LP. This Learning Path will teach you topics that help get further use out of your NGFW such as SSL Decryption. Once you've configured SSL Decryption, the NGFW will be able to defend your network in new ways, including URL Filtering, Credential Detection, DGA Detection, DNS Sinkholes, and more!
Learning Path
•Intermediate
F5 BIG-IP Next Cloud-Native Network Functions (CNF)
This lab will guide and educate you on what the F5 BIG-IP Next Cloud-Native Network Functions are, how they are deployed with NVIDIA DOCA, and how they will ultimately help show the gains in offloading traffic to DPUs instead of tying up resources for your applications on the CPU of the physical K8 host.
Advanced Configuration Lab
•Advanced
•6 launches
Partner POV | Secure GenAI Adoption for State and Local Government
As Generative AI (GenAI) introduces new efficiencies to the public sector, it also raises concerns regarding data loss and uncontrolled use. To adopt these tools with confidence, state and local agencies must move beyond "risky experimentation" toward a security-first approach centered on three fundamentals: visibility, guardrails, and continuous validation.
Partner Contribution
•Apr 10, 2026