Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Events

Select a tab

What's popular

AI Essentials

Welcome to the AI Essentials Learning Series. This series is designed to equip you with the knowledge and skills necessary to understand key aspects of Artificial Intelligence (AI). As AI continues to revolutionize industries and transform the way we live and work, it is crucial to understand the fundamental components that enable its remarkable performance. This series of learning paths will provide you with a comprehensive overview of AI, High Performance Storage, High Performance Networking, High Performance Compute, and Security, all tailored to the specific needs of AI applications.
Learning Series

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025.
WWT Research
•Jan 1, 2025

Building for Success: A CTO's Guide to Generative AI

A strategic roadmap for Chief Technology Officers to align GenAI strategies with business goals, assess infrastructure needs, and identify the talent and skills needed to achieve sustainable GenAI transformation.
WWT Research
•Apr 17, 2025

WWT Adds $1 Trillion TAM With Softchoice's Microsoft 'Prowess,' Midmarket Reach And $4B Security Boom

WWT's merger with Softchoice has been 'a match made in heaven' as the company attacks a new $1 trillion total addressable market with more Microsoft abilities and greater customer reach than ever before, says WWT leader Bob Olwig.
News
•Jul 17, 2025

What's new

Partner POV | Varonis Acquires SlashNext, AI-Native Email Security

Varonis acquires SlashNext, integrating its AI-driven phishing detection into their Data Security Platform. This strategic move enhances threat detection from email to data, offering comprehensive protection against sophisticated social engineering attacks. By connecting email, identity, and data, Varonis aims to revolutionize data security and stop breaches before they begin.
Partner Contribution
•Sep 10, 2025

AI Acceleration in Action: How AI in Higher Ed Is Balancing Innovation vs. Risk

AI is transforming higher education — from classrooms to research labs — but with innovation comes risk. How can universities protect sensitive data, meet compliance obligations, and still foster discovery? In this episode of the AI Proving Ground Podcast, WWT Higher Ed Principal Advisor Janet and Principal Cybersecurity Consultant for AI Bryan Fite share how one leading university is tackling AI governance and building guardrails that empower rather than restrict. Their insights reveal why higher ed is a proving ground for responsible AI adoption — and why every industry should be paying attention.
Video
•1:55
•Sep 9, 2025

F5 BIG-IP Next for Kubernetes on NVIDIA BlueField-3 DPUs

This lab will guide and educate you on what the F5 BIG-IP Next for Kubernetes is, how it is deployed with NVIDIA DOCA, and how it will ultimately help show the gains in offloading traffic to DPUs instead of tying up resources for your applications on the CPU of the physical K8 host.
Advanced Configuration Lab
•4 launches

Black Hat Ignites Under Vegas Lights

When asked about advocacy, WWT's Kate Kuehn defined it as helping leaders cut through the noise, balancing opportunity with risk, and moving beyond the myth of a magic pill solution.
News
•Aug 27, 2025

From AI to cybersecurity, WWT focused on enabling customers

"Our partner relationships and our alliances are critical. We can't do what we do without those relationships and working together with our customers," commented Jason Brouwers, Vice President, Head of Asia Pacific, Japan and China.
News
•Aug 26, 2025

Partner POV | Fortinet and CrowdStrike Joint Solution

Delivering AI-powered protection, adaptive zero-trust access, and accelerated threat detection and response across your entire digital infrastructure
Partner Contribution
•Aug 25, 2025

Partner POV | Shadow AI Risks Proliferate as GenAI Platforms and AI Agents See Rapid Adoption

Netskope's latest research reveals a 50% surge in genAI platform usage, highlighting the rise of shadow AI and its security risks. As enterprises embrace AI innovation, they must enhance data loss prevention and real-time monitoring to safeguard against unsanctioned AI applications, ensuring responsible AI governance and usage.
Partner Contribution
•Aug 24, 2025

AI Won't Save You: Easterly, Joyce and CISOs on the Cybersecurity Reality No One Wants to Hear

At a time when AI feels like oxygen — powering every tool, every conversation, every strategy — security leaders at the forefront are sounding the alarm: it won't fix the fundamentals. In this episode, top voices from government, industry and the next generation of cyber talent share unfiltered perspectives on AI-augmented threats, the velocity of attacks and what it really takes to defend in 2025 and beyond. Interviews include former CISA Director Jen Easterly, former NSA Cybersecurity Director Rob Joyce and a bevy of cyber experts from inside and out of WWT.
Video
•1:10
•Aug 19, 2025

Partner POV | 3 Key Areas to Focus on When You're Evaluating AI Security

In the rapidly evolving AI security landscape, proactive measures are crucial. As AI tools and applications grow, so do unique threats like context window manipulation and system prompt leakage. Organizations must prioritize specialized AI security solutions to navigate these challenges effectively, or risk learning the hard way.
Partner Contribution
•Aug 19, 2025

The AI Security Crossroads: Black Hat and Defcon 2025 Show What's Next

Black Hat USA 2025 and Defcon 33 spotlighted AI's pivotal role in cybersecurity, shifting focus to agentic AI's dual use in defense and attack. Keynotes emphasized integrated resilience and trust, while labs and demos showcased AI-driven threats and defenses. The AI battleground is evolving rapidly, demanding adaptive strategies.
Blog
•Aug 18, 2025

Partner POV | Key Findings from the Thales 2025 Data Threat Report

The Thales 2025 Data Threat Report highlights a critical juncture in cybersecurity, emphasizing the urgent need for robust data protection amid rapid AI adoption and quantum threats. As organizations grapple with complex cloud environments and evolving compliance demands, a unified, strategic approach to data security becomes essential to safeguard sensitive information and ensure resilience.
Partner Contribution
•Aug 15, 2025

Partner POV | Dataminr Pulse for Cyber Risk: AI for Preemptive Cyber Defense

In a world of escalating cyber threats, Dataminr's AI-driven Pulse for Cyber Risk offers a transformative shift from reactive to proactive defense. By delivering real-time, actionable intelligence, it empowers organizations to preemptively neutralize threats, bridging the gap between digital and physical security in an era of rapid digital transformation.
Partner Contribution
•Aug 15, 2025

Partner POV | CrowdStrike Launches New Services to Strengthen AI Security and SOC Readiness

AI is reshaping business and security landscapes, introducing risks like shadow AI and misconfigurations. CrowdStrike's AI Security Services, including AI Systems Security Assessment and AI for SecOps Readiness, help organizations secure AI systems and integrate AI into operations, countering AI-savvy adversaries with strategic, threat-informed solutions.
Partner Contribution
•Aug 8, 2025

Zero Trust + AI: Accelerate Innovation With Security Built for the AI Era

AI powers innovation and drives efficiency—but also helps bad actors deliver more relentless and effective attacks. Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks.
Video
•1:00
•Aug 4, 2025

Partner POV | Introducing The Autonomous SOC Maturity Model

The Autonomous SOC envisions a future where AI and automation transform security operations, enhancing human expertise rather than replacing it. By incrementally advancing through a maturity model, organizations can achieve greater efficiency and resilience, navigating the complex cybersecurity landscape with a blend of innovation and strategic human oversight.
Partner Contribution
•Aug 1, 2025

Blackbird.AI Partners With World Wide Technology To Protect Enterprises And Executives From Narrative Attacks

Strategic alliance brings narrative intelligence to global companies to combat misinformation, disinformation and AI-generated deepfakes that cause financial, operational and reputational harm.
News
•Jul 29, 2025

Is Cisco's Cybersecurity Architecture Ready for Agentic AI?

Cisco & Splunk are boosting threat detection as enterprises race to secure autonomous AI agents whilst combating sophisticated cyber attacks powered by AI
News
•Jul 28, 2025

AI Agents: Scaling Your Digital Workforce

Enterprise adoption of AI agents is spiking, with industry surveys showing most large enterprises are already piloting AI agents. But there's a lot of hype out there. In this episode of the AI Proving Ground Podcast, Technical Solutions Architect Ina Poecher and Jason Campagna, Senior Director of WWT's AI Practice, expose widespread "agent-washing," highlight practical but ROI-heavy use cases you can pursue now. Tune in to discover how agentic architecture turns generative AI hype into secure, measurable enterprise AI outcomes — and what's next for multi-agent ecosystems.
Video
•1:36
•Jul 22, 2025

Partner POV | AI Traffic Intelligence: Gain Deep Observability into GenAI and LLM Activity

Learn how Gigamon AI Traffic Intelligence offers real-time insights without deploying agents, ensuring security without disrupting innovation.
Video
•3:59
•Jul 22, 2025

Partner POV | AI Fuels Rise of Hard-to-Detect Bots in Internet Traffic

AI-driven bots are reshaping cybersecurity, with automated traffic surpassing human activity for the first time in a decade. The rise of accessible AI tools has enabled less sophisticated cyber attackers to launch more frequent bot attacks, posing significant challenges for industries reliant on APIs, such as financial services, healthcare, and e-commerce.
Partner Contribution
•Jul 18, 2025

AI Security

AI security helps harness AI's potential while mitigating emerging threats, ensuring safe, compliant and ethical use across the organization.

130 Followers

At a glance

191Total
55Articles
53Blogs
40Videos
15Events
10Labs
10WWT Research
3Learning Paths
2Briefings
1Assessment
1Case Study
1Playlist
What's related
  • Security
  • AI & Data
  • Applied AI
  • Cybersecurity Risk & Strategy
  • Blog
  • WWT Presents
  • AI Proving Ground
  • ATC
  • Security Operations
  • GenAI
  • Cisco
  • Application & API Security
  • Data Security
  • Palo Alto Networks
  • Cisco AI Solutions
  • Network Security
  • Cyber Resilience
  • Cloud
  • Cisco Security
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies