Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

Department of War (DoW) Issues Success Memo for WWT's Joint Cyber Hunt Kit (JCHK) Prototype

The recognition from the DoW's Defense Innovation Unit (DIU) marks a meaningful step forward in how Cyber Protection Teams (CPTs) carry out their missions.
Blog
•Dec 3, 2025

Microsoft Ignite 2025: Key Takeaways from WWT and Softchoice

Microsoft Ignite 2025 delivered a sweeping vision for the future of enterprise technology, centered on AI agents, cloud-native innovation and secure digital transformation.
Blog
•Nov 25, 2025

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

What's new

Azure Local Unleashed: Key Announcements from Microsoft Ignite 2025 and Beyond

Discover the biggest Azure Local announcements from Microsoft Ignite 2025 and the lead-up period. This blog highlights new features like enterprise-scale deployments, SAN support, NVIDIA GPU integration, and Microsoft 365 Local. Get a quick, clear overview of how Azure Local is transforming private and sovereign cloud solutions.
Blog
•Dec 18, 2025

Process-Oriented OT Cybersecurity: The View Beyond the Network

This post discusses the limitations of traditional OT cybersecurity tools that rely on network-layer monitoring, highlighting the risks of compromised control logic and data manipulation at the process layer, and presents SIGA's process-oriented cybersecurity approach using out-of-band electrical signal data and machine learning to provide CISOs with reliable visibility and decision support for operational resilience in critical infrastructure and manufacturing environments.
Blog
•Dec 16, 2025

Part 5 — From Flannel to Cilium: Why Isovalent Enterprise Becomes the Logical Next Step

Let's discuss the natural evolution from just getting things working to adding all the bells and whistles, a Flannel to Cilium discussion, powered by eBPF, as the logical next step for Kubernetes networking. Looking at how Isovalent Enterprise enhances scalability, security and observability, offering a robust, production-ready platform for complex, multi-cluster environments. Transitioning to Cilium signifies embracing advanced capabilities for modern network engineering.
Blog
•Dec 16, 2025

Beyond "Coming Soon": What has Omnissa Delivered?

Omnissa has moved quickly from "coming soon" to real-world delivery of major platform integrations, security enhancements and user experience improvements that continue to transform the digital workplace.
Blog
•Dec 16, 2025

The Surprising AI Tool That Made Me a Better Technical Writer

Explores how Grammarly's AI has transformed writing workflow within a highly technical engineering role. It highlights Grammarly's seamless system-wide integration, context-aware suggestions, tone control and specialized focus on clarity and communication. Rather than replacing the writer's voice, Grammarly enhances it by streamlining drafting, editing and expression in ways that general AI tools often miss.
Blog
•Dec 15, 2025

Microsoft 365 Price Increase Announced: What Organizations Need to Know

Microsoft has announced upcoming list price increases for commercial Microsoft 365 and Office 365 suites effective July 1, 2026.
Blog
•Dec 12, 2025

FlashStack for the Next Era of Enterprise Compute

FlashStack, a collaboration between Cisco, Pure Storage and Nutanix, redefines enterprise infrastructure by decoupling compute and storage, enabling scalable, flexible, and AI-ready platforms. Leveraging NVMe over TCP and Cisco Intersight, it offers operational simplicity and strategic control, empowering organizations to innovate without legacy constraints. Validate its potential with WWT's Advanced Technology Center.
Blog
•Dec 11, 2025

Cisco Comply-to-Connect (C2C) Training in Partnership with WWT

Cisco's updated Comply-to-Connect (C2C) training, developed with WWT, aligns with DoD Zero Trust pillars and now includes third-party integrations like MECM, Tenable and Trellix to address mixed-vendor endpoint compliance. Delivered through Cisco U, it provides labs, videos, and six technical tracks focused on Cisco ISE configuration, policy and compliance, supporting secure C2C deployment across DoD environments.
Blog
•Dec 11, 2025

Learning OpenShift and Kubernetes with Windsurf

Windsurf, an AI coding assistant, revolutionizes learning Kubernetes and OpenShift by enhancing understanding and efficiency. It accelerates troubleshooting, automates tasks and clarifies complex concepts, transforming daunting challenges into manageable opportunities. While AI aids learning, mastering fundamentals remains crucial for effective use and maximizing its potential.
Blog
•Dec 10, 2025

Windows 365 for Agents: The Secure, Scalable AI Agent Platform for the Modern Enterprise

Windows 365 has already revolutionized end-user computing (EUC) with Cloud PCs. Now, Windows 365 for Agents extends this innovation to AI-driven workloads, enabling secure, scalable and policy-controlled environments for agents.
Blog
•Dec 9, 2025
Network Documentation

Using NetBox Custom Objects

NetBox's custom objects enable tailored data modeling. As organizations seek comprehensive data integration, custom objects empower deployments by embracing the ability to model unique environments, driving innovation and standardization in infrastructure automation. Explore how custom objects can transform your network management strategy.
Blog
•Dec 4, 2025

Department of War (DoW) Issues Success Memo for WWT's Joint Cyber Hunt Kit (JCHK) Prototype

The recognition from the DoW's Defense Innovation Unit (DIU) marks a meaningful step forward in how Cyber Protection Teams (CPTs) carry out their missions.
Blog
•Dec 3, 2025

Build GenAI Confidence with WWT's AI Prompt Engineering Training Series

As organizations race to unlock the full value of generative AI (GenAI), many discover that technology alone is not enough. WWT's Prompt Engineering Training Series provides a structured, progressive and secure pathway that helps teams accelerate AI tool adoption, improve outcomes and drive measurable business impact.
Blog
•Dec 2, 2025

Ransomware & Breach Trends: 2025 Insights and Strategic Recommendations

In 2025, ransomware attacks accelerated, with encryption occurring within hours, challenging traditional defenses. Organizations face urgent gaps in detection and response, as attackers employ swift tactics and extortion. To combat this, focus on behavioral analytics, robust recovery plans and proactive strategies to enhance cyber resilience and minimize impact.
Blog
•Dec 2, 2025

Zero Trust and Identity: Why A Business Can't Afford to Ignore IAM

Identity isn't just a login—it's the backbone of trust. As cyber threats accelerate, safeguarding people, data and reputation demands more than passwords. This article reveals how Identity and Access Management powers Zero Trust security, with real-world lessons and practical guidance.
Blog
•Dec 1, 2025

Takeaways from Supercomputing Conference 2025

Experts share what stood out at the international event for high-performance computing, networking, storage and analysis.
Blog
•Nov 25, 2025

Microsoft Ignite 2025: Key Takeaways from WWT and Softchoice

Microsoft Ignite 2025 delivered a sweeping vision for the future of enterprise technology, centered on AI agents, cloud-native innovation and secure digital transformation.
Blog
•Nov 25, 2025

WWT and Tanium at Converge 2025: Autonomous IT & Unstoppable Partnership

At Tanium Converge 2025, WWT showcased its strategic partnership with Tanium, emphasizing real-time, AI-driven risk management. Key innovations like Tanium Ask and Jump Gate highlight a shift towards Autonomous IT, enhancing operational efficiency and security. Together, WWT and Tanium empower organizations to transition from reactive to proactive IT management.
Blog
•Nov 24, 2025

The Path Is Clear: Mission-Critical Networks Deserve Segment Routing

The world's most essential networks—power grids, rail systems, public safety—depend on deterministic performance. Yet legacy SONET and MPLS architectures have become barriers to progress. Segment Routing (SR) delivers a modern alternative: simpler, faster and built for automation. This post explores how SR clears the path for modernization without compromising reliability.
Blog
•Nov 24, 2025

Impressions from Ignite 2025 through an EUC Lens

Microsoft Ignite 2025 made clear that AI and cloud innovation are reshaping end-user computing. From Intune's Copilot agents to Windows 365's AI-enabled Cloud PCs and AVD's hybrid flexibility, the event highlighted how enterprises can deliver secure, intelligent and seamless digital workspaces that empower productivity across devices, data centers and disruptions.
Blog
•Nov 24, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

69 Followers

At a glance

896Total
896Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Digital Workspace
  • Software Development
  • Cisco
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Proving Ground
  • AI Security
  • Primary Storage
  • GenAI
  • Network Security
  • Microsoft
  • End-User Computing

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies