AI Security
AI Security Insights
Filter by Content Types
- No options
341 results found
Hands-On Lab Workshop: Cisco AI Defense
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed to challenge and sharpen your AI security skills. The Cisco AI Defense CTF lab puts you in the middle of real-world AI threat scenarios, where you will exploit and defend against vulnerabilities including prompt injection, jailbreaking, and misuse of generative AI models. Watch Cisco AI Defense technology intercept and neutralize attacks in real time as you work through progressively challenging scenarios. This lab goes beyond surface-level awareness—giving you direct, practical experience with the tools and techniques used to secure enterprise AI environments.
Webinar
•May 7, 2026 • 11am
WWT Innovation Vendor Spotlight - 7AI
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with 7AI - a leader in agentic AI security for security operations.
7AI customers trust dynamic AI agents to get security work done at scale. The company's AI agents autonomously investigate security alerts, proven in production at Fortune 500 scale, eliminating the work humans shouldn't be doing so security teams can finally do human work: strategic threat hunting, proactive defense, and the work that actually protects organizations.
Experience
•Apr 22, 2026 • 11am
The Next Phase of Cybersecurity: When the Attacker Is No Longer Human
Autonomous AI systems are redefining cyber threats — operating at machine speed, adapting in real time and attacking without human involvement. Learn why traditional security architectures fall short and what it takes to defend your organization in this new era.
Blog
•Apr 7, 2026
Agentic AI Is Coming for Software Development — Are Enterprises Ready?
As AI coding assistants move from novelty to necessity, enterprises are discovering that the real challenge is managing what happens before and after the code is created. In this episode of the AI Proving Ground Podcast, WWT's executive AI advisor Nate McKie explains why faster code generation is only half the answer — and why leaders who don't reinvest the time they're saving are already falling behind.
Video
•3:40
•Apr 7, 2026
Check Point is building AI Security into the center of the Cyber Strategy
Check Point's cybersecurity strategy focuses on four pillars: Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security. As AI becomes integral to decision-making, Check Point emphasizes AI Security to address unique risks. Their AI Defense Plane ensures comprehensive governance, visibility, and continuous testing, redefining enterprise defense in the agentic AI era.
Blog
•Apr 3, 2026
Why Storage, Security and Data Readiness Now Decide AI Success
AI success now depends on whether your enterprise foundation is actually ready. Recorded live at NVIDIA GTC, this episode of the AI Proving Ground Podcast features WWT AI leader Mike Trojecki and Everpure VP of AI and Analytics Kaycee Lai discussing why business outcomes, secure data access, low-latency infrastructure, governance and storage architecture are becoming the real differentiators as organizations try to operationalize AI at scale.
Video
•1:36
•Mar 31, 2026
Partner POV | Dataminr for Cyber Defense: What's Coming, What It Costs, and What to Do Next
In 2024, 57% of cyber attacks went undetected by security teams despite using numerous tools. Dataminr's AI-native Cyber Defense unites threat intelligence, operations, and risk management to answer critical questions: What's coming? What does it cost? What do we do next? This integrated approach enhances foresight, focus, and action.
Partner Contribution
•Mar 31, 2026
How to Scale Agentic AI Without Losing Control
AI is moving out of prototype mode and into production. In this episode of the AI Proving Ground Podcast, recorded live at NVIDIA GTC, leaders from Cisco, NVIDIA and WWT unpack the real job in front of enterprise executives: how to scale agentic AI, secure AI factories, manage token economics and prepare infrastructure for an inference-heavy future.
Video
•5:10
•Mar 30, 2026
The Cloud Identity Crisis
In 2025, attackers shifted focus to credential harvesting and identity-based attacks, exploiting the surge in non-human identities (NHIs) in cloud environments. As NHIs outnumber human identities, organizations face increased risks. Effective identity governance, including Just-in-Time access and automation, is crucial for robust cloud security and minimizing operational exposure.
Blog
•Mar 27, 2026
Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR
Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
•Mar 26, 2026 • 9am
Partner POV | CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI
In 2025, adversaries exploited AI and trusted pathways to evade detection, marking a year of unprecedented cyber threats. CrowdStrike's 2026 Global Threat Report reveals a 65% increase in eCrime speed and a surge in AI-enabled attacks. As adversaries grow stealthier, understanding their tactics becomes crucial for effective defense.
Partner Contribution
•Mar 24, 2026
Partner POV | Varonis Launches Atlas to Secure AI and the Data That Powers It
Varonis Atlas revolutionizes AI security by offering an end-to-end platform that manages the entire AI security lifecycle. It uniquely integrates data context, enabling organizations to safely scale AI by continuously discovering, monitoring, and securing AI systems, including shadow AI, while ensuring compliance and mitigating third-party risks.
Partner Contribution
•Mar 24, 2026