Security
Security Insights
Filter by Content Types
- No options
1093 results found
Hands-On Lab Workshop: Infection Core
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed for blue team enthusiasts and cybersecurity professionals. The Infection Core lab challenges you to track, contain, and neutralize SHIVR, an autonomous cyber weapon that has escaped onto the public web. Through a series of malware analysis, reverse engineering, memory forensics, and cryptanalysis challenges, you'll develop and test your skills in real-world scenarios. This lab goes beyond surface-level analysis, pushing you to uncover hidden logic and defend critical infrastructure against advanced threats.
Webinar
•Mar 19, 2026 • 11am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Feb 12, 2026 • 10am
Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap
Join our virtual hands-on lab to explore Zscaler's Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler's modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You'll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats.
Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you'll be able to view all Zscaler modules and their settings in action
Webinar
•Feb 5, 2026 • 11am
CrowdStrike CTF: Falcon
THIS EVENT IS FULL. IF YOU ARE INTERESTED IN THIS EVENT, WE HAVE ANOTHER ON 2/12/26 https://www.wwt.com/event/696159765f962d6b5d41c68c .
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Jan 22, 2026 • 10am
Partner POV | Armis Exposure Management & Security on NVIDIA BlueField-3 DPU
Armis and NVIDIA's collaboration revolutionizes Cyber-Physical System security with an agentless solution on BlueField-3 DPUs. This innovative approach enhances visibility, threat detection, and operational continuity across IT and OT environments, addressing legacy vulnerabilities and sophisticated threats without impacting performance, ensuring robust protection and seamless deployment.
Partner Contribution
•Jan 15, 2026
The New Era with Agentic SOC
Modern SOC architectures are evolving beyond monolithic SIEMs, which struggle with rising telemetry and attacker complexity. New technologies like Security Data Pipeline Platforms (SDPP) and Generative AI are enabling the Agentic SOC, where enrichment, storage, detection and triage operate as independent layers—creating a more scalable, flexible and sustainable security operations model.
Blog
•Jan 13, 2026
Former NSA Cyber Director on the Emerging AI Threat Landscape
AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026
Cisco Secure Firewall Sandbox 7.6
Cisco Secure Firewall/Firepower Management NGFW Sandbox lab is a capability of the Advanced Technology Center (ATC). This is designed to provide an environment to gain hands-on experience with the Cisco Secure Firewall version 7.6. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•55 launches
Cisco NGFW Foundation Lab
Cisco NGFW Foundation Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Cisco Secure Firewall solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•898 launches
Quantum Systems: A Beginners' Guide for Classical Engineers (Part I)
Quantum systems are not mystical black boxes, but rather rigorously structured architectures with familiar analogs. This note provides a foundation for quantum computing using concepts familiar to classical engineers, x86 architects and network professionals. It maps qubits, quantum gates and qubit connectivity graphs into well-known ideas such as transistors, instruction sets and data center fabrics, making quantum systems easier to understand without diluting the physics.
WWT Research
•Jan 13, 2026
Illumio Zero Trust Segmentation Platform Overview
In today's hyper-connected, hybrid, multi-cloud world, cybersecurity incidents are increasingly targeted, costly, and disruptive, with breaches taking an average of 277 days to identify and contain and costing $4.45 million on average. Attackers exploit a lack of visibility and segmentation to access high-value assets, posing a significant threat to cyber resiliency. The Illumio Zero Trust Segmentation Platform offers a solution by providing unprecedented visibility across cloud, endpoint, and data center environments from a single console. It enables security teams to easily configure, deploy, and monitor segmentation, setting granular policies to control communications and isolate high-value assets, effectively stopping breaches and ransomware from spreading and strengthening cyber resiliency.
Video
•1:46
•Jan 13, 2026
Partner POV | What Does Preemptive Security Mean? Here's a Quick FAQ
In a rapidly evolving cyber landscape, preemptive security anticipates and neutralizes threats before they manifest, leveraging AI and predictive intelligence. As AI-driven attacks rise, traditional reactive methods falter. Embracing preemptive strategies, like Protective DNS, transforms security from a cost-center to a business enabler, fostering resilience and innovation.
Partner Contribution
•Jan 13, 2026