Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Explore

Select a tab

What's popular

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

What's new

Payers, Pressure and the Pivot: Turning Health Plans into Health Platforms

In 2026, payers face margin pressure, regulatory whiplash and rising consumer expectations — even as AI reshapes operations. This blog outlines what executives should expect as payers strive to transform into true health platforms.
Blog
•Feb 9, 2026

WWT Sets a New Standard for Enterprise-Ready AI with Cisco Secure AI Factory with NVIDIA

Discover how WWT, Cisco and NVIDIA are giving enterprises a clear, secure path to turn AI ambition into real-world impact with the Cisco Secure AI Factory with NVIDIA modular reference design, supported by proven expertise and ready-to-use resources.
Blog
•Feb 9, 2026

Seeing the Firewall Clearly: Policy Insights That Actually Matter

Firewall policies grow quickly and rarely shrink, leaving rulebases cluttered, risky, and audit-heavy. Check Point Policy Insights turns policy and traffic data into continuous, actionable intelligence. It identifies unused, overlapping, and overly permissive rules, supports framework-aligned audits, and enables fast, governed cleanup directly in SmartConsole—automating work that once took days and proving why Check Point management stands out.
Blog
•Feb 6, 2026

Milan 2026: Securing the Upcoming Winter Games in an Age of Hyper-Connectivity and AI-Driven Chaos

The expanding digital ecosystem of the Winter Games demands identity-first, AI-aware security heading into Milan 2026.
Blog
•Feb 5, 2026

Security Group Tags or Adaptive Policies: Which is Right for your Network?

Cloud-managed networking is changing how enterprises design, secure and operate their networks. This post explores modern assurance models, Zero Trust policy approaches, and how platforms like Meraki and Catalyst align with different operational realities.
Blog
•Feb 2, 2026

Regulatory Uncertainty Drives New Business Models for Healthcare

Rapid regulatory and reimbursement shifts are forcing healthcare leaders to rethink care delivery, partnerships and operating models for 2026.
Blog
•Jan 29, 2026

Integrating Dataminr into a Palo Alto Networks–Centric Platform

Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026

Comprehensive Guide to OWASP Top 10: Web Applications, APIs and Automated Threats

The Open Web Application Security Project (OWASP) provides industry-standard frameworks for identifying and mitigating the most critical security risks facing modern applications. This guide explores three critical OWASP initiatives and maps F5's Web Application and API Protection (WAAP) solutions to each threat category. What You'll Learn: * OWASP Web Application Security Top 10 (2021) * OWASP API Security Top 10 (2023) * OWASP Automated Threats to Web Applications (21 threat types) * How F5 solutions protect against each threat category * Hands-on lab exercises to practice defense techniques
Blog
•Jan 27, 2026

Securing Your Cyber Vault: How Observability and NDR Turn Blind Spots into Confidence

Cyber vaults are your last line of defense against ransomware—but are they truly secure? Learn how WWT and ExtraHop RevealX deliver real-time visibility and assurance through Network Detection & Response (NDR), so you can recover with confidence when it matters most.
Blog
•Jan 26, 2026

A Quick look at QUIC

Learn about QUIC (Quick UDP Internet Connection), a modern transport protocol that enhances internet speed, security and reliability by building on UDP. It integrates TLS 1.3 for faster handshakes, employs BBR for smarter congestion control, and uses multiplexed streams to eliminate head-of-line blocking. Seamless connection migration ensures uninterrupted connectivity, making QUIC a promising successor to TCP.
Blog
•Jan 23, 2026

Purpose in the Age of Agentic AI: Takeaways from UVA's Conference on Ethical AI in Business

The University of Virginia's third-annual conference on Ethical AI in Business was hosted by the Darden School of Business and organized by the LaCross AI Institute.
Blog
•Jan 22, 2026

Is the Data Warehouse Dead?

The traditional enterprise data warehouse is evolving rather than becoming obsolete, adapting its role alongside advancements in AI technologies such as large language models (LLMs) and retrieval-augmented generation (RAG). These AI capabilities enable direct analytical operations on diverse data types, challenging the need for all data to be centralized and conformed in a warehouse.
Blog
•Jan 21, 2026

Harness the Power of Azure with NGINXaaS – Advanced Load Balancing and API Gateway

This blog explains how modern, API-driven applications demand cloud-native security and highlights how F5 NGINXaaS for Azure delivers a fully managed, high-performance WAF to protect them. It outlines key capabilities such as OWASP Top 10 defenses, API security, DevSecOps integration and Azure-native observability, helping enterprises secure apps and APIs without hardware or operational overhead.
Blog
•Jan 20, 2026

What is Fault-Managed Power and Why is it Gaining Momentum?

As digital buildings evolve, traditional power models falter. Fault-Managed Power Systems (FMPS) offer a transformative solution that merges high-power delivery with active fault management. This approach enhances safety, simplifies installation and supports scalable infrastructure, aligning power management with modern network practices for diverse applications, from edge devices to outdoor venues.
Blog
•Jan 19, 2026

AI as Strategy: What CEOs and Boards Must Get Right in 2026

AI is now a core driver of productivity, margin expansion and EPS growth. Fortune 100 CEOs and Boards must elevate AI to a strategic priority, enforce governance, focus on ROI, build talent readiness, and embed responsible practices to stay competitive and agile in 2026. Leaders who act decisively will outperform; those who delay risk falling behind.
Blog
•Jan 16, 2026

Edwin AI Tested Under Production Conditions in WWT's Advanced Technology Center

LogicMonitor's Edwin AI, integrated into WWT's Advanced Technology Center, offers enterprises a production-grade environment to test agentic AIOps. By simulating complex failure scenarios, teams can measure improvements in MTTR, uptime and alert volume, accelerating evaluation cycles and validating AI-driven workflows before live deployment.
Blog
•Jan 16, 2026

How AI Lets Developers Tackle Unfamiliar Challenges with Confidence

AI coding assistants revolutionize software development by accelerating complex tasks and fostering innovation. This post explores a team's journey from digitizing static data to building APIs, highlighting AI's role in enhancing efficiency and confidence. The real transformation lies in embracing change, experimenting boldly and redefining what's possible in development.
Blog
•Jan 14, 2026

Priority Flow Control: The Stop Light of the AI Networking Highway

Priority Flow Control (PFC) acts like a traffic light, pausing specific data flows to prevent congestion and data loss in AI networks. By enabling lossless Ethernet fabrics, PFC enhances performance in AI workloads, crucial for applications like RDMA. Explore its implementation across various networking hardware for optimal network efficiency.
Blog
•Jan 13, 2026

The New Era with Agentic SOC

Modern SOC architectures are evolving beyond monolithic SIEMs, which struggle with rising telemetry and attacker complexity. New technologies like Security Data Pipeline Platforms (SDPP) and Generative AI are enabling the Agentic SOC, where enrichment, storage, detection and triage operate as independent layers—creating a more scalable, flexible and sustainable security operations model.
Blog
•Jan 13, 2026

Healthcare Insights for 2026

As healthcare leaders look toward 2026, the industry finds itself at a familiar crossroads—one defined by resilience, reinvention and rising expectations. After years of cost-cutting, clinician and staff burnout, and regulatory volatility, healthcare leaders recognize that future success requires reimagining core business models and organizational change.
Blog
•Jan 13, 2026

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

74 Followers

At a glance

925Total
925Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Cisco
  • Digital Workspace
  • Software Development
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Proving Ground
  • AI Security
  • GenAI
  • Network Security
  • Primary Storage
  • Microsoft
  • End-User Computing

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies