Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Explore

Select a tab

What's popular

WWT Sets a New Standard for Enterprise-Ready AI with Cisco Secure AI Factory with NVIDIA

Discover how WWT, Cisco and NVIDIA are giving enterprises a clear, secure path to turn AI ambition into real-world impact with the Cisco Secure AI Factory with NVIDIA modular reference design, supported by proven expertise and ready-to-use resources.
Blog
•Feb 9, 2026

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

What's new

Storage Automation with Red Hat OpenShift and NetApp

Deploying Red Hat OpenShift with NetApp Trident enables efficient storage management for stateful applications. By configuring persistent storage using local or shared options, administrators can optimize resources for AI, databases and virtual machines. This guide simplifies the setup of storage classes and volume snapshots for seamless integration and scalability.
Blog
•Feb 13, 2026

Manufacturing at the EDGE: SCADA Instrumentation, Model Context Protocol and Agentic Design Patterns

Modern manufacturing is evolving towards data-centric, automated and intelligent systems that require contextualized operational data streaming from IoT-based edge devices converging with IT networks for adaptive real-time decision-making. MCP offers a structured approach to managing and interpreting diverse data streams, while SCADA systems serve as the core industrial instrumentation integrated with agentic methods and advanced inferencing to enhance manufacturing processes.
Blog
•Feb 13, 2026

When Identity Becomes the Battlefield: Why Palo Alto Networks + CyberArk Changes the Map

Palo Alto Networks' acquisition of CyberArk marks a structural shift in cybersecurity, making Identity Security a core platform pillar alongside Network and SecOps. By unifying privilege, machine and AI identity protection, the move accelerates platformization and operational resilience.
Blog
•Feb 12, 2026

MWC Barcelona 2026: Embracing the Future of AI in Telecom and Enterprise

Join us for a preview of Mobile World Congress (MWC) 2026 Barcelona, including insights from WWT's AI-work in the telecom and enterprise verticals.
Blog
•Feb 12, 2026

The AI Adoption Gap Isn't Technical. It's Human.

At the Cisco AI Summit, multiple leaders pointed to a growing gap between what AI can do and how organizations are absorbing it. This gap is not because the technology isn't ready, but because organizations haven't changed how people work, collaborate and build trust around AI.
Blog
•Feb 11, 2026

Moving Healthcare from AI Pilots to Enterprise AI-at-Scale

This will be the year healthcare moves decisively from AI experimentation to scaled, governed, enterprise AI embedded across clinical and operational functions with measurable ROI and impact.
Blog
•Feb 11, 2026

Accelerating Kubernetes Ingress and Security Automation with F5 and WWT

This blog highlights automated deployment patterns of F5 NGINX Ingress Controller paired with F5 NGINX App Protect across Amazon Web Services, Google Cloud Platform and Microsoft Azure.
Blog
•Feb 11, 2026

Payers, Pressure and the Pivot: Turning Health Plans into Health Platforms

In 2026, payers face margin pressure, regulatory whiplash and rising consumer expectations — even as AI reshapes operations. This blog outlines what executives should expect as payers strive to transform into true health platforms.
Blog
•Feb 9, 2026

WWT Sets a New Standard for Enterprise-Ready AI with Cisco Secure AI Factory with NVIDIA

Discover how WWT, Cisco and NVIDIA are giving enterprises a clear, secure path to turn AI ambition into real-world impact with the Cisco Secure AI Factory with NVIDIA modular reference design, supported by proven expertise and ready-to-use resources.
Blog
•Feb 9, 2026

Seeing the Firewall Clearly: Policy Insights That Actually Matter

Firewall policies grow quickly and rarely shrink, leaving rulebases cluttered, risky, and audit-heavy. Check Point Policy Insights turns policy and traffic data into continuous, actionable intelligence. It identifies unused, overlapping, and overly permissive rules, supports framework-aligned audits, and enables fast, governed cleanup directly in SmartConsole—automating work that once took days and proving why Check Point management stands out.
Blog
•Feb 6, 2026

Milan 2026: Securing the Upcoming Winter Games in an Age of Hyper-Connectivity and AI-Driven Chaos

The expanding digital ecosystem of the Winter Games demands identity-first, AI-aware security heading into Milan 2026.
Blog
•Feb 5, 2026

Security Group Tags or Adaptive Policies: Which is Right for your Network?

Cloud-managed networking is changing how enterprises design, secure and operate their networks. This post explores modern assurance models, Zero Trust policy approaches, and how platforms like Meraki and Catalyst align with different operational realities.
Blog
•Feb 2, 2026

Regulatory Uncertainty Drives New Business Models for Healthcare

Rapid regulatory and reimbursement shifts are forcing healthcare leaders to rethink care delivery, partnerships and operating models for 2026.
Blog
•Jan 29, 2026

Integrating Dataminr into a Palo Alto Networks–Centric Platform

Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026

Comprehensive Guide to OWASP Top 10: Web Applications, APIs and Automated Threats

The Open Web Application Security Project (OWASP) provides industry-standard frameworks for identifying and mitigating the most critical security risks facing modern applications. This guide explores three critical OWASP initiatives and maps F5's Web Application and API Protection (WAAP) solutions to each threat category. What You'll Learn: * OWASP Web Application Security Top 10 (2021) * OWASP API Security Top 10 (2023) * OWASP Automated Threats to Web Applications (21 threat types) * How F5 solutions protect against each threat category * Hands-on lab exercises to practice defense techniques
Blog
•Jan 27, 2026

Securing Your Cyber Vault: How Observability and NDR Turn Blind Spots into Confidence

Cyber vaults are your last line of defense against ransomware—but are they truly secure? Learn how WWT and ExtraHop RevealX deliver real-time visibility and assurance through Network Detection & Response (NDR), so you can recover with confidence when it matters most.
Blog
•Jan 26, 2026

A Quick look at QUIC

Learn about QUIC (Quick UDP Internet Connection), a modern transport protocol that enhances internet speed, security and reliability by building on UDP. It integrates TLS 1.3 for faster handshakes, employs BBR for smarter congestion control, and uses multiplexed streams to eliminate head-of-line blocking. Seamless connection migration ensures uninterrupted connectivity, making QUIC a promising successor to TCP.
Blog
•Jan 23, 2026

Purpose in the Age of Agentic AI: Takeaways from UVA's Conference on Ethical AI in Business

The University of Virginia's third-annual conference on Ethical AI in Business was hosted by the Darden School of Business and organized by the LaCross AI Institute.
Blog
•Jan 22, 2026

Is the Data Warehouse Dead?

The traditional enterprise data warehouse is evolving rather than becoming obsolete, adapting its role alongside advancements in AI technologies such as large language models (LLMs) and retrieval-augmented generation (RAG). These AI capabilities enable direct analytical operations on diverse data types, challenging the need for all data to be centralized and conformed in a warehouse.
Blog
•Jan 21, 2026

Harness the Power of Azure with NGINXaaS – Advanced Load Balancing and API Gateway

This blog explains how modern, API-driven applications demand cloud-native security and highlights how F5 NGINXaaS for Azure delivers a fully managed, high-performance WAF to protect them. It outlines key capabilities such as OWASP Top 10 defenses, API security, DevSecOps integration and Azure-native observability, helping enterprises secure apps and APIs without hardware or operational overhead.
Blog
•Jan 20, 2026

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

74 Followers

At a glance

932Total
932Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Cisco
  • Digital Workspace
  • Software Development
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Proving Ground
  • AI Security
  • Network Security
  • GenAI
  • Primary Storage
  • Microsoft
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies