Security
Security Insights
Filter by Content Types
- No options
1221 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Jan 22, 2026 • 10am
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Jan 15, 2026 • 9am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Dec 11, 2025 • 9am
Inside NVIDIA: The $5 Trillion Engine Redefining the Future of AI
AI is rewriting the rules of the global economy. Powered by leaps in accelerated computing, digital twins and autonomous systems, a new industrial era is emerging in real time. In this episode of the AI Proving Ground Podcast, NVIDIA leaders Jay Puri, Charlie Wuischpard and Craig Weinstein break down how the entire AI stack — from the silicon driving breakthroughs to the software shaping intelligent experiences — is redefining how we build, operate and compete.
This conversation gives leaders a clear view of what's coming next—and what it takes to align their organizations, scale AI innovation, and stay ahead in a race where velocity, architecture, and ambition now determine advantage.
Video
•0:58
•Dec 5, 2025
Rethinking the Enterprise Architecture: AI Will Change Everything You Know
Learn how AI is reshaping the very foundation of IT architecture and operations.
WWT Research
•Dec 4, 2025
How F5 Drives Citrix VDI Excellence in Application Delivery
This lab discusses the collaboration between F5 technologies and Citrix VDI to enhance security and performance in virtual desktop infrastructure. F5's security-first approach and performance optimization strengthen Citrix VDI environments, meeting the needs of remote workforces and setting new standards for secure and high-performance virtualized experiences. The hardware and software used in the lab include 5 Windows Servers (v2016) and 1 F5 BIG-IP APM (v17.1.0.1).
Advanced Configuration Lab
•49 launches
F5 Distributed Cloud WAAP Use Cases Demo
Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment.
You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•223 launches
Accelerate Your Migration to Quantum-Safe Cryptography
As adversaries stockpile encrypted data and quantum capabilities advance, organizations face a shrinking window to act. Learn what's at risk and how early movers can gain an advantage by starting their migration to quantum-safe cryptography now
WWT Research
•Dec 3, 2025
Department of War (DoW) Issues Success Memo for WWT's Joint Cyber Hunt Kit (JCHK) Prototype
The recognition from the DoW's Defense Innovation Unit (DIU) marks a meaningful step forward in how Cyber Protection Teams (CPTs) carry out their missions.
Blog
•Dec 3, 2025
F5 Distributed Cloud on AWS
Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode
This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within AWS, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode.
This hands-on experience guides you through deploying a multi-cloud application across AWS, which is accessible via Private IP through an F5
By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within AWS environments privately.
Advanced Configuration Lab
•9 launches
Zero Trust with F5 BIG-IP APM, SSLO & WAF
In this lab we will be addressing a specific set of BIG-IP (versatility) characteristics: authentication and orchestration. In doing so, we will also be showing you some powerful capabilities of BIG-IP APM and SSL Orchestrator.
Advanced Configuration Lab
•41 launches
F5 Distributed Cloud for LLMs
In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments.
However, distributed deployments come with challenges, including:
Complexity in managing multi-cloud environments.
Lack of unified visibility across clouds.
Inconsistent security and policy enforcement.
F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•27 launches