Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Events

Select a tab

What's popular

AI Essentials

Welcome to the AI Essentials Learning Series. This series is designed to equip you with the knowledge and skills necessary to understand key aspects of Artificial Intelligence (AI). As AI continues to revolutionize industries and transform the way we live and work, it is crucial to understand the fundamental components that enable its remarkable performance. This series of learning paths will provide you with a comprehensive overview of AI, High Performance Storage, High Performance Networking, High Performance Compute, and Security, all tailored to the specific needs of AI applications.
Learning Series

Data Center Priorities for 2025

A roadmap for what to prioritize in the data center space.
WWT Research
•Jan 1, 2025

Building for Success: A CTO's Guide to Generative AI

A strategic roadmap for Chief Technology Officers to align GenAI strategies with business goals, assess infrastructure needs, and identify the talent and skills needed to achieve sustainable GenAI transformation.
WWT Research
•Apr 17, 2025

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025.
WWT Research
•Jan 1, 2025

Cisco AI Defense Capture the Flag (CTF)

Experience Cisco AI Defense in an interactive Capture the Flag (CTF), designed to showcase how Cisco is securing the future of GenAI.
Advanced Configuration Lab
220 launches

What's new

Blackbird.AI Partners With World Wide Technology To Protect Enterprises And Executives From Narrative Attacks

Strategic alliance brings narrative intelligence to global companies to combat misinformation, disinformation and AI-generated deepfakes that cause financial, operational and reputational harm.
News
•Jul 29, 2025

Is Cisco's Cybersecurity Architecture Ready for Agentic AI?

Cisco & Splunk are boosting threat detection as enterprises race to secure autonomous AI agents whilst combating sophisticated cyber attacks powered by AI
News
•Jul 28, 2025

AI Agents: Scaling Your Digital Workforce

Enterprise adoption of AI agents is spiking, with industry surveys showing most large enterprises are already piloting AI agents. But there's a lot of hype out there. In this episode of the AI Proving Ground Podcast, Technical Solutions Architect Ina Poecher and Senior Director of WWT's AI Practice expose widespread "agent-washing," highlight practical but ROI-heavy use cases you can pursue now. Tune in to discover how agentic architecture turns generative AI hype into secure, measurable enterprise AI outcomes — and what's next for multi-agent ecosystems.
Video
•1:36
•Jul 22, 2025

Partner POV | AI Fuels Rise of Hard-to-Detect Bots in Internet Traffic

AI-driven bots are reshaping cybersecurity, with automated traffic surpassing human activity for the first time in a decade. The rise of accessible AI tools has enabled less sophisticated cyber attackers to launch more frequent bot attacks, posing significant challenges for industries reliant on APIs, such as financial services, healthcare, and e-commerce.
Partner Contribution
•Jul 18, 2025

WWT Adds $1 Trillion TAM With Softchoice's Microsoft 'Prowess,' Midmarket Reach And $4B Security Boom

WWT's merger with Softchoice has been 'a match made in heaven' as the company attacks a new $1 trillion total addressable market with more Microsoft abilities and greater customer reach than ever before, says WWT leader Bob Olwig.
News
•Jul 17, 2025

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

Hack the Future: AI Meets Security

World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025

Partner POV | The AI Arms Race: When Attackers Leverage Cutting-Edge Tech

AI's dual role in cybersecurity is reshaping the landscape, with criminals leveraging advanced AI models for sophisticated attacks. From AI-enhanced phishing to deepfakes, these tools create highly personalized, convincing threats. As AI evolves, its potential for misuse grows, challenging organizations to stay ahead in this escalating cyber arms race.
Partner Contribution
•Jul 11, 2025

Opinion: How to Balance Learning Analytics With Data Privacy

The capacity of learning analytics platforms to collect troves of student data makes them both institutional necessities and liabilities. A handful of best practices can help colleges and universities keep them secure.
News
•Jul 10, 2025

Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians

Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025

Cisco AI Defense Capture the Flag (CTF)

Experience Cisco AI Defense in an interactive Capture the Flag (CTF), designed to showcase how Cisco is securing the future of GenAI.
Advanced Configuration Lab
•220 launches

Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security

Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025

Partner POV | Advancing Deep Observability: Gigamon AI Vision Comes to Life

Gigamon unveils its AI-driven strategy, integrating GenAI into its Deep Observability Pipeline with AI Traffic Intelligence and GigaVUE-FM Copilot. These innovations enhance security and management of hybrid cloud infrastructures, addressing visibility gaps and evolving threats. As AI reshapes operations, Gigamon empowers teams with clarity, context, and control for operational excellence.
Partner Contribution
•Jun 27, 2025

The Versatile Data Center Smart Switch: Cisco N9300

The Cisco Nexus N9300 Smart Switch revolutionizes data center infrastructure with its convergence of high-performance switching, network security and application services. Featuring Cisco Silicon One ASICs and a Data Processing Unit, it offers intelligent, service-aware capabilities. Optional Hypershield enhances zero-trust security, making it ideal for AI, hybrid cloud and security-conscious environments.
Blog
•Jun 25, 2025

The Cyber Window

The Cyber Window is a learning series hosted by Global Application Security Architect Matt Rose that covers a wide range of Application Security topics. In each episodes, Matt breaks down complex AppSec topics into easy-to-understand concepts and lessons.
Playlist
•Jun 22, 2025

AI Flavors…

We're continually bombarded with various types, flavors and descriptors of what AI is (and isn't). Therefore, to make things a little simpler (and to follow up on the on-stage descriptions I gave of the AI variants), this is a short description of what three of the main AI options would do with (and for) you if you'd ask…
Blog
•Jun 20, 2025

Cisco Live 2025: Smokin' Hot Security Infused in the Network with a side of AI to go!

Readout of highlights from the WWT Cisco Security support team that attended Cisco Live 2025.
Blog
•Jun 19, 2025

The Cyber Window Episode 11: AI Problems for App Sec Teams

In this episode of The Cyber Window, WWT Global Application Security Architect Matt Rose discusses the challenges AI copilots and vibe coding practices effect application security teams
Video
•4:33
•Jun 18, 2025

Leading Through Change: Dimitri Sirota on BigID's Data-Driven Future

How do you navigate a data landscape that's evolving by the minute — and still stay one step ahead? Join BigID CEO and co-founder Dimitri Sirota in a candid conversation as he breaks down how his company is tackling today's most urgent data challenges while building for what's next. In this engaging discussion, we explore how BigID is helping enterprises unlock more value from their data, adapt to shifting regulations and drive innovation across privacy, security and governance. From the power of automation to the real-world impact of AI on data intelligence, Dimitri shares insights that matter to anyone leading in a data-first world.
Video
•0:55
•Jun 18, 2025

AI Security

AI security helps harness AI's potential while mitigating emerging threats, ensuring safe, compliant and ethical use across the organization.

125 Followers

At a glance

178Total
52Blogs
47Articles
36Videos
15Events
10Labs
10WWT Research
3Learning Paths
2Briefings
1Assessment
1Case Study
1Playlist
What's related
  • Security
  • AI & Data
  • Applied AI
  • Cybersecurity Risk & Strategy
  • Blog
  • WWT Presents
  • AI Proving Ground
  • ATC
  • Security Operations
  • GenAI
  • Cisco
  • Application & API Security
  • Palo Alto Networks
  • Cisco AI Solutions
  • Data Security
  • Network Security
  • Cyber Resilience
  • Cisco Security
  • Cloud
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies