Security
Security Insights
Filter by Content Types
- No options
1135 results found
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Nov 13, 2025 • 9am
🚩Disarm Me CTF: Hack, Decrypt, Disable
This red team–style CTF puts your team in the role of attackers breaking into an emulated internal network. You'll play as contracted gray-hat operatives (SAVE) infiltrating The League — a shadowy collective behind ransomware and extortion campaigns — to recover intelligence and disrupt their plans.
Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights.
What you'll practice:
🔍 Attacker tradecraft — reconnaissance, exploitation, persistence.
🧠 Adversary tool fluency — exposure to real-world tools and methods.
🤝 Critical thinking & communication — operate as a focused squad under timed pressure.
🗂️ Side quests & extra intelligence — optional objectives that surface richer findings for your organization.
Cyber Range
•Nov 6, 2025 • 9am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Oct 29, 2025 • 10am
WWT Innovation Vendor Spotlight - Chainguard
The next WWT Innovation Vendor Spotlight will feature a discussion with Chainguard. This webinar will provide an overview of the WWT AppSec Practice and include a conversation with Chainguard regarding their approach to software security.
Chainguard provides hardened, secure, and production-ready builds for open source software used in development and deployment processes. The company works with Fortune 500 enterprises and various global organizations such as Anduril, Canva, Fortinet, Hewlett Packard Enterprise, Snap Inc., and Snowflake. Chainguard is supported by investors including Amplify, IVP, Kleiner Perkins, Lightspeed Venture Partners, Mantis VC, Redpoint Ventures, Sequoia Capital, and Spark Capital. Further information can be found at:
https://www.chainguard.dev/
Agenda:
* Introductions (5 Min)
* WWT Application Security Practice (10 Min)
* Chainguard Overview (30–45 Min)
* Q&A (15 Min)
When:
October 22nd, 2025
11:30am EST – 1:00pm EST
Experience
•Oct 22, 2025 • 10:30am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
THIS EVENT IS FULL, PLEASE MOVE OVER TO THE OCTOBER 29TH EVENT https://www.wwt.com/event/68c1cee17c8605e3612c902e
Cyber Range
•Oct 16, 2025 • 8am
Hands-On Lab Workshop: Mastering Threat Detection and Incident Response
Join our Virtual Lab Workshop to explore the Mastering Threat Detection & Incident Response Learning Path. Inspired by a real Pass-the-Hash attack simulation, this session follows a red team campaign across the full cyber kill chain—credential theft, lateral movement, and privilege escalation. Gain hands-on experience with tools like Falcon XDR, Falcon ITDR, Security Onion, and SOAR as you learn to detect and respond to early-stage threats, escalate incidents, and defend Active Directory from Kerberoasting. Work through real-world scenarios with guidance from experienced analysts and red teamers. Ideal for Tier 1 SOC analysts aiming to level up to Tier 2/3 roles. Stick around for live Q&A with our experts.
Webinar
•Oct 9, 2025 • 11am
A Roadmap to Compliance with NERC PRC-005 for Power Utilities
Power utilities must comply with NERC PRC-005 by verifying the physical operation of protection system relays and breakers through independent Level Zero instrumentation. This ensures real-world actions match commands, addressing cybersecurity vulnerabilities and regulatory obligations while avoiding costly penalties.
Blog
•Oct 8, 2025
AI's Trust Problem: What Great Leaders Know That Most Don't with Great Place to Work CEO Michael Bush and WWT CTO Mike Taylor
Artificial intelligence investment is exploding, but adoption often stalls. In this episode of the AI Proving Ground Podcast, Great Place to Work CEO Michael Bush and WWT CTO Mike Taylor unpack the real reason why: trust. They reveal how culture, leadership and access — not just technology — determine whether AI pilots fail or flourish, and why people-first leadership may be the ultimate competitive advantage in the age of AI.
Video
•0:59
•Oct 7, 2025
Partner POV | Proofpoint's Next Human Factor Report Uncovers Insights: Phishing & URL-Based Threats
Phishing tactics are evolving, with attackers increasingly using URLs over attachments, expanding into mobile and hybrid vectors like smishing and QR code phishing. Despite security measures, phishing exploits human instincts, posing significant risks. Organizations must enhance defenses against these diversified threats to prevent data breaches and large-scale fraud.
Partner Contribution
•Oct 3, 2025
Executive Leadership in the Age of AI: Lessons from WWT Co-Founder and CEO Jim Kavanaugh
AI is reshaping business faster than any technology in history. But while employees are already using AI daily, enterprises are struggling to capture value at scale. In this episode of the AI Proving Ground Podcast, WWT Co-Founder and CEO Jim Kavanaugh explains why executive leadership is the critical factor in moving beyond pilots, how companies should build the right foundations for AI and why waiting on the sidelines may be the biggest risk of all.
Video
•5:19
•Sep 30, 2025
Cyber Resilience Maturity Model
A roadmap to assess, evolve and future-proof your cyber resilience posture
WWT Research
•Sep 29, 2025
Cloud Security: Announcements from Fal.con 2025
Crowdstrike continues to add new features to their platform, making Falcon Cloud Security a top contender when enterprises consider how they are going to secure their cloud investment, including AI applications in the cloud.
Blog
•Sep 29, 2025