Security
Security Insights
Filter by Content Types
- No options
1062 results found
Hands-On Lab Workshop: Infection Core
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed for blue team enthusiasts and cybersecurity professionals. The Infection Core lab challenges you to track, contain, and neutralize SHIVR, an autonomous cyber weapon that has escaped onto the public web. Through a series of malware analysis, reverse engineering, memory forensics, and cryptanalysis challenges, you'll develop and test your skills in real-world scenarios. This lab goes beyond surface-level analysis, pushing you to uncover hidden logic and defend critical infrastructure against advanced threats.
Webinar
•Mar 19, 2026 • 11am
Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap
Join our virtual hands-on lab to explore Zscaler's Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler's modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You'll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats.
Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you'll be able to view all Zscaler modules and their settings in action
Webinar
•Feb 5, 2026 • 11am
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Jan 22, 2026 • 10am
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
We invite you to complete the SentinelOne XDR Learning Path and Initiation, our demo CTF, to be best prepared! You can find both of these under the related content at the bottom of this page. After 12/17, they can be launched from the "Resources" tab on this page.
Cyber Range
•Jan 15, 2026 • 9am
Security Chiefs Sound Alarm Over 'Naked AI'
F5's Shawn Wormke and WWT's Chris Konrad say the rapid operationalization of AI is creating a widening gap between innovation and protection—leaving most organizations unprepared for real-world threats, governance failures and the coming quantum era.
Video
•1:10
•Dec 23, 2025
Zero Trust Helps Federal Agencies Move Software to Production Faster Share
IT officials, including WWT's Ramon Thomas, said zero trust supports rapid deployment, inventory visibility and stronger cybersecurity across IT and OT systems.
News
•Dec 18, 2025
Data Security Posture Management (DSPM) Briefing
In this briefing, we will work with your key stakeholders to identify where your data is located, who is accessing it, how and where it's moving and how does this align with your governance, risk and compliance policies.
Our experts will discuss how we help customers identify gaps in your data security and we will help identify how to best implement and operationalize a DSPM platform.
Briefing
•2 hrs
Partner POV | Adapting to Modern Threats: Armis & Fortinet Deliver Measurable Cyber Resilience in OT
The convergence of IT, OT, and cloud systems has expanded attack surfaces, demanding seamless security solutions. Armis Centrix™ and Fortinet's integration offers real-time visibility and adaptive controls, ensuring operational resilience and compliance. This partnership enhances detection, containment, and response, safeguarding critical infrastructures with precision and speed.
Partner Contribution
•Dec 17, 2025
Inside the AI Factory: Dell's AI Data Platform
Rather than chasing GPUs and one-off pilots, Dell's Allen Clingerman and World Wide Technology's Matt Halcomb argue that the winning AI "factories" will be built on use-case clarity, data sovereignty and flexible, end-to-end infrastructure that can keep pace with a fast-moving market.
Video
•1:15
•Dec 17, 2025
AI and Data Priorities for 2026
A strategic roadmap highlighting the most critical AI and data focus areas for 2026
WWT Research
•Dec 16, 2025
Process-Oriented OT Cybersecurity: The View Beyond the Network
This post discusses the limitations of traditional OT cybersecurity tools that rely on network-layer monitoring, highlighting the risks of compromised control logic and data manipulation at the process layer, and presents SIGA's process-oriented cybersecurity approach using out-of-band electrical signal data and machine learning to provide CISOs with reliable visibility and decision support for operational resilience in critical infrastructure and manufacturing environments.
Blog
•Dec 16, 2025
Part 5 — From Flannel to Cilium: Why Isovalent Enterprise Becomes the Logical Next Step
Let's discuss the natural evolution from just getting things working to adding all the bells and whistles, a Flannel to Cilium discussion, powered by eBPF, as the logical next step for Kubernetes networking. Looking at how Isovalent Enterprise enhances scalability, security and observability, offering a robust, production-ready platform for complex, multi-cluster environments. Transitioning to Cilium signifies embracing advanced capabilities for modern network engineering.
Blog
•Dec 16, 2025