Security
Security Insights
Filter by Content Types
- No options
1161 results found
Hands-On Lab Workshop: Zscaler Unified Vulnerability Management
Join our interactive lab workshop to explore Zscaler's Unified Vulnerability Management (UVM) and Risk360 modules. This session is designed for security and IT professionals seeking to enhance their organization's asset hygiene, vulnerability management, and cyber risk quantification. You'll gain hands-on experience with Zscaler's Security Fabric, learning how to identify and prioritize vulnerabilities, deduplicate findings, and streamline remediation workflows. The workshop includes practical exercises, expert guidance, and live Q&A to help you master modern vulnerability management strategies.
Webinar
•Nov 20, 2025 • 11am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Nov 20, 2025 • 10am
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Nov 13, 2025 • 9am
🚩Disarm Me CTF: Hack, Decrypt, Disable
This red team–style CTF puts your team in the role of attackers breaking into an emulated internal network. You'll play as contracted gray-hat operatives (SAVE) infiltrating The League — a shadowy collective behind ransomware and extortion campaigns — to recover intelligence and disrupt their plans.
Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights.
What you'll practice:
🔍 Attacker tradecraft — reconnaissance, exploitation, persistence.
🧠 Adversary tool fluency — exposure to real-world tools and methods.
🤝 Critical thinking & communication — operate as a focused squad under timed pressure.
🗂️ Side quests & extra intelligence — optional objectives that surface richer findings for your organization.
Cyber Range
•Nov 6, 2025 • 9am
Strategic Planning for Post-Quantum Cryptography with WWT and Palo Alto Networks
Join World Wide Technology and Palo Alto Networks experts for an engaging virtual event focused on preparing your organization for the quantum era. Discover the latest insights on post-quantum cryptography (PQC), learn about the risks of "harvest now, decrypt later" attacks, and understand why being PQC ready is critical for long-term data protection and regulatory compliance. Our experts will discuss industry trends, customer challenges, and practical strategies for building crypto agility, ensuring a smooth transition to new standards. Gain actionable guidance to future-proof your security posture and maintain resilience against evolving threats.
Webinar
•Oct 30, 2025 • 9am
CrowdStrike CTF: Falcon
THIS EVENT IS FULL. THERE IS ANOTHER CROWDSTRIKE CTF on 11/20/25 https://www.wwt.com/event/68d1aa3809339a9dd017002b
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Oct 29, 2025 • 10am
Cisco Hybrid Mesh Firewall Overview
Cisco's Hybrid Mesh Firewall solution is a highly distributed security fabric optimized to stop advanced threats, protect application vulnerabilities, and implement zero trust segmentation across environments.
Video
•1:58
•Oct 24, 2025
The Life of a Security Girl
In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025
Check Point NGFW Foundations Lab
The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
•9 launches
Beyond Alerts: The Next Generation of Managed Detection and Response
Next-generation managed detection and response (NGMDR) revolutionizes cybersecurity by integrating AI with human expertise, shifting from reactive to proactive defense. This hybrid model enhances threat detection, reduces response times and anticipates attacks, transforming security from a burden to a strategic enabler of resilience and innovation.
Blog
•Oct 22, 2025
Partner POV | Backing Up Your Data Isn't Enough. Only Complete Cyber Resilience Will Protect Your Agency From Ransomware.
Ransomware disrupts lives, not just organizations. Prevention isn't enough; agencies need a proactive cyber resilience strategy. Rubrik bridges gaps between IT teams, ensuring data integrity and rapid recovery. Embrace zero-trust, immutable backups, and threat monitoring to safeguard critical data and maintain operational continuity.
Partner Contribution
•Oct 21, 2025
Can AI Be Trusted to Run Critical Networks?
Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025