AI Security
AI Security Insights
Filter by Content Types
- No options
375 results found
WWT Innovation Vendor Spotlight - depthfirst
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with depthfirst.
depthfirst is an AI-native security platform that understands your code, business logic, and infrastructure to find more vulnerabilities, slash false positives, and give developers actionable fixes in their workflows. The depthfirst platform provides continuous, closed-loop remediation from business logic vulnerabilities to external validation via dynamic testing.
Experience
•Jun 16, 2026 • 11am
ARMOR up with WWT... because AI is inside the wire
Security for AI represents an unprecedented challenge, but AI security practices are compounding the problem by slowing adoption, limiting utilization, and undermining the return on your AI investments. Learn how the "WWT ARMOR framrework" — developed with leading organizations and industry partners — can accelerate AI efforts, increase utilization, and unlock productivity to drive maximum value, all while enhancing security and governance.
*Lunch & Harbor Court Parking Validation Provided
Experience
•May 28, 2026 • 4pm
WWT — Frontier Model Readiness: 45 Days of Lessons from Mythos
Join WWT for this webinar as we share the latest field learnings across Mythos, and more recently announced Daybreak, and MDASH — and what they mean for your organization's security posture.
The frontier AI threat landscape has shifted faster than most organizations anticipated. Forty-Five days after Mythos, two new models — Daybreak and MDASH — have introduced meaningful capability jumps that demand a fresh look at your readiness posture.
In this session, WWT brings together updated research, field learnings, and a differentiated service offering designed specifically to help organizations move from awareness to action. You'll hear directly from practitioners who have been working this problem every day — and walk away with a clear picture of where WWT can help you accelerate your readiness posture.
Webinar link:
https://wwt.webex.com/wwt/j.php?MTID=md8019c7d5a327dc9432c6ca993ff54a3
Webinar number:
2662 842 9497
Webinar password:
mGNMs3nS5a4
Experience
•May 21, 2026 • 2pm
Securing AI When Agents Move Faster Than Humans Can Respond
AI security is entering a new phase where models like Anthropic's Mythos are becoming more capable and agentic systems can take action across enterprise environments. The risk is no longer just bad answers or hallucinations. It is speed, scope and blast radius. In this episode of the AI Proving Ground Podcast, WWT security leaders Jillian Nix-Anderson and Istvan Berko explore how organizations can secure themselves in the agentic AI era, where vulnerability discovery, response timelines and operational complexity are all accelerating. And they talk about how WWT's ARMOR framework helps teams structure the conversation across infrastructure, models, data, software development, operations and compliance.
Video
•7:12
•May 20, 2026
Claude Mythos and the Remediation Velocity Gap
WWT's agentic patching and remediation approach leverages agentic AI and deterministic automation to bridge the gap between vulnerability discovery and defense. As AI accelerates exploit development, this governed model ensures safe, efficient remediation, urging enterprises to adapt and maintain control in an evolving threat landscape.
Blog
•May 15, 2026
Secure the Use of GenAI Models with Cisco Secure Access
Cisco Secure Access serves as an integrated platform that provides the necessary infrastructure for organizations to govern and protect their artificial intelligence usage through centralized policy management. By embedding AI Access capabilities directly into the solution, it allows businesses to maintain robust security, visibility, and data protection while fostering innovation across the enterprise.
Video
•1:33
•May 13, 2026
Mythos Is Coming. Are You Building Walls or Traps?
Anthropic's forthcoming Mythos model wasn't built to hack. It just learned how — and it's good at it. In this AI Proving Ground Podcast episode, former NSA cybersecurity director Rob Joyce and WWT cyber leader Kent Noyes break down what Mythos means for your security posture and what the defender's playbook looks like now.
Video
•5:07
•May 13, 2026
Prompt Security Demo: The Platform for AI Security from SentinelOne
Watch SentinelOne's Prompt Security Platform in action — a pioneer in securing AI at runtime, preventing AI-related data leakage and protecting intelligent agents. This demo walks through how the platform protects employee AI usage, secures developer tools and AI code assistants, and safeguards homegrown AI applications — all without slowing innovation.
Video
•5:20
•May 12, 2026
Partner POV | The AI Security Illusion: When Confidence Outpaces Proof
AI is reshaping cybersecurity, creating a gap between perceived and actual security. Despite increased investments, breach rates rise, with AI involved in 83% of incidents. The 2026 Hybrid Cloud Security Survey reveals the need for deep observability to bridge this gap, urging organizations to move from assumptions to evidence.
Partner Contribution
•May 12, 2026
I Built a C2 Channel in 5 Minutes. Your Security Team Had No Idea.
A covert AI agent experiment reveals a new threat class, exploiting trusted SaaS APIs like Slack for command-and-control without detection. As autonomous agents become standard, enterprises must adopt proactive security measures. WWT's AI Gateway and Governance Framework offers a structured approach to mitigate these emerging risks.
Blog
•May 11, 2026
Defending at the Speed of AI
A 12-point response plan for cybersecurity and resilience leaders
WWT Research
•May 8, 2026
WWT - Mythos Response Framework
Join WWT for this webinar event around Mythos readiness content developed with security leaders across the sector — a prescriptive framework.
Mythos-class AI capabilities have moved a working assumption most vulnerability programs still rely on: that exploit development is slow enough for weekly or monthly patch cycles to keep pace. Median time-to-exploit is now measured in hours, and the barrier to weaponizing published CVEs has collapsed.
Rather than add to the noise, we've distilled the best public guidance into a 12-point response framework structured around three shifts: strengthen the foundation, move from vulnerability management to exploit prevention, and align people and partners.
Webinar link:
https://er-wwt.webex.com/er-wwt/j.php?MTID=m5df93c3a9932ead47d16ca4501b9e62f
Webinar number:
2550 700 1561
Webinar password:
QpGWYBy83s3
Experience
•May 7, 2026 • 3:30pm