Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Explore

Select a tab

What's popular

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

External Dynamic Lists (EDLs) in Palo Alto Firewalls dynamically integrate IPs, URLs, and domains into security policies, reducing change requests. They empower SOCs to manage threats without firewall changes. Despite limitations, EDLs enhance security by automating updates and supporting authentication. Implementing EDLs optimizes security posture and streamlines threat management.
Blog
•Oct 10, 2023

Designing Red Hat OpenShift with Hosted Control Planes

Red Hat OpenShift's Hosted Control Planes (HCP) revolutionize cluster management by reducing server costs and enabling efficient, scalable deployments. With advanced features like autoscaling and multi-cluster management, HCP offers a streamlined approach to managing clusters both on-premise and in the cloud, transforming the OpenShift experience.
Blog
•Mar 6, 2026

WWT Sets a New Standard for Enterprise-Ready AI with Cisco Secure AI Factory with NVIDIA

Discover how WWT, Cisco and NVIDIA are giving enterprises a clear, secure path to turn AI ambition into real-world impact with the Cisco Secure AI Factory with NVIDIA modular reference design, supported by proven expertise and ready-to-use resources.
Blog
•Feb 9, 2026

What's new

Hands-on with Everpure's FlashBlade//EXA

WWT's unfiltered take on the Everpure FlashBlade//EXA install we completed in the AI Proving Ground.
Blog
•Apr 13, 2026

DDI is Everyone's Problem. Not Just the Network Teams.

DNS, DHCP and IP address management are collectively known as DDI. Learn why security, cloud, application and DevOps teams all have skin in the DDI game and what happens when they're left out of the conversation.
Blog
•Apr 9, 2026

Prisma AIRS Series - Part 1: Discovery

AI is spreading faster than most organizations can track it, across apps, APIs, and teams, often without clear visibility or control. This article explores why traditional discovery falls short and how Prisma AIRS approaches AI security as a connected system, starting with Discovery. By building a unified, contextual view of models, data, and interactions; including shadow AI, organizations can finally understand where risk exists and where control is needed. Next, we turn to Assessment; how to test what you've found.
Blog
•Apr 9, 2026

Securing the Unsecurable: How Zscaler Airgap Protects Devices That Can't Protect Themselves

Billions of IoT and OT devices can't run security software, making them prime targets and easy entry points for attackers. This blog explores how Zscaler Airgap delivers agentless, zero trust segmentation to protect every device on your network, regardless of its capabilities.
Blog
•Apr 8, 2026

The Next Phase of Cybersecurity: When the Attacker Is No Longer Human

Autonomous AI systems are redefining cyber threats — operating at machine speed, adapting in real time and attacking without human involvement. Learn why traditional security architectures fall short and what it takes to defend your organization in this new era.
Blog
•Apr 7, 2026

Garbage In, Garbage Amplified: The AI Feedback Loop Most Companies Miss

Most teams are using AI to summarize and connect internal data. Fewer realize they may be creating a feedback loop in the process. When AI-generated content gets stored alongside source material, it can quietly shift what is treated as truth. This blog article breaks down how it happens, why it matters, and one simple structural change that can prevent it.
Blog
•Apr 7, 2026

From Observer to Catalyst: How Faculty Learned to Teach with AI in Four Sessions

Over four sessions in March 2026, WWT and GitHub took a cohort of educators from complete beginners to running fully automated classrooms — distributing assignments, collecting submissions, and setting up autograding from scratch. No coding background required. Participants left with a working GitHub Classroom, a reusable curriculum hub, and a question that had shifted from what is this? to what do I build next?
Blog
•Apr 7, 2026

Elevate Your Branch & Campus Networking Lifecycle Management

Today's networking and security trends are driving branches and campuses to rethink their network lifecycle management strategy.
Blog
•Apr 6, 2026

Check Point is building AI Security into the center of the Cyber Strategy

Check Point's cybersecurity strategy focuses on four pillars: Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security. As AI becomes integral to decision-making, Check Point emphasizes AI Security to address unique risks. Their AI Defense Plane ensures comprehensive governance, visibility, and continuous testing, redefining enterprise defense in the agentic AI era.
Blog
•Apr 3, 2026

Cisco Ultra-Reliable Wireless Backhaul (CURWB)

Wireless connectivity has long been too unreliable for mission-critical industrial operations. Until now. Cisco's Ultra-Reliable Wireless Backhaul (URWB) technology delivers the consistency and predictability of a physical cable, without the cable. From smart factories and autonomous vehicles to high-speed rail and busy seaports, discover how URWB is enabling industries to embrace wireless connectivity without compromising on performance or safety.
Blog
•Apr 1, 2026

AI, Experience and the Human at the Center

The Gartner Digital Workplace Summit emphasized the centrality of employees in AI-driven workplaces. Success hinges on designing AI to enhance human workflows, not overshadow them. Organizations must prioritize personalized, DEX-focused strategies, ensuring technology aligns with human needs to drive innovation and productivity.
Blog
•Apr 1, 2026

Cisco Secure Access is a Natural Evolution of Cisco Umbrella

In a rapidly evolving digital landscape, traditional security measures fall short. Cisco Secure Access, a cloud-delivered SSE solution, integrates zero trust, AI-driven threat intelligence, and defense-in-depth protection. It simplifies security operations, enhances user experience, and adapts to modern threats, ensuring seamless, secure access across diverse environments.
Blog
•Apr 1, 2026

Nine Days to Exploitation. Two Weeks to Bypass. How Dataminr and Cortex Break the ToolShell Cycle.

Microsoft patched the SharePoint ToolShell vulnerability chain in July 2025. Within nine days it was under active exploitation. Within two weeks, the patches had been bypassed. Eight months later, a third variant was confirmed in the wild. Dataminr flagged the threat before the first CVE was published, giving customers weeks of early visibility that most organizations never had. This post walks through how the attack works, what it means for each team in your organization, and how Dataminr's early warning, combined with Cortex XSOAR, gives the SOC the visibility and prioritization it needs to stay ahead of a threat that won't stay fixed.
Blog
•Mar 31, 2026

Memory Tiering in VMware Cloud Foundation 9: A Closer Look at the TCO Equation

VCF 9's native memory tiering capability fundamentally changes how virtual infrastructure is sized and priced. For organizations running large-scale virtualized environments, understanding this feature — and its relationship to today's DDR5 vs. NVMe pricing gap — may reshape how you think about platform economics entirely.
Blog
•Mar 30, 2026

Why Networking Must Evolve Now: 3 Key Takeaways from HPE Tech Jam 2026

At HPE Tech Jam 2026, networking emerged as mission-critical infrastructure powering AI, hybrid cloud and digital operations. As Praveen Jain highlighted, rising complexity and scale demand automation and intent-based networking. Platforms like Juniper Apstra enable resilient, AI-ready data center networks—giving modern enterprises a critical competitive edge.
Blog
•Mar 30, 2026

Intent-Based Networking Is No Longer Optional: Why Juniper Apstra Is Winning in the Modern Data Center

Intent-based networking is no longer a future vision—it's a present-day necessity. As data centers evolve to support hybrid cloud, AI workloads, and multi-vendor complexity, legacy, configuration-driven models are breaking down. Forward-looking organizations are turning to intent-based networking to regain control, accelerate operations, and reduce risk—with Juniper Apstra leading the way as a proven platform for modern data center transformation.
Blog
•Mar 30, 2026

The Cloud Identity Crisis

In 2025, attackers shifted focus to credential harvesting and identity-based attacks, exploiting the surge in non-human identities (NHIs) in cloud environments. As NHIs outnumber human identities, organizations face increased risks. Effective identity governance, including Just-in-Time access and automation, is crucial for robust cloud security and minimizing operational exposure.
Blog
•Mar 27, 2026

Two Paths to a Cloud Operating Model: Top-Down or Bottom-Up

There are only two ways to become a true cloud operator: executive mandate or technical evolution. This piece examines both paths, their risks and why lasting success requires convergence between leadership vision and IT execution.
Blog
•Mar 27, 2026

Key Takeaways from the Optical Fiber Communications 2026 Conference

Members of WWT's Core Networking Team share their key takeaways and insights from the Optical Fiber Communications Conference 2026.
Blog
•Mar 27, 2026

The Invisible Network: Why Global-Fi Architecture Is the Enterprise Differentiator of 2026

In 2026, Global-Fi Architecture emerges as a crucial enterprise differentiator, transforming networks into seamless, invisible platforms. Emphasizing wireless-first design, SD-WAN integration, micro-segmentation and AIOps, it redefines business operations. Organizations investing in this architecture gain a competitive advantage, ensuring networks are reliable, secure and unobtrusive, aligning with evolving business needs.
Blog
•Mar 27, 2026

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

80 Followers

At a glance

1004Total
1004Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Cisco
  • Digital Workspace
  • Networking
  • Cybersecurity Risk & Strategy
  • Software Development
  • Security Operations
  • AI Security
  • Network Security
  • Primary Storage
  • GenAI
  • Microsoft
  • End-User Computing
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies