AI Security
AI Security Insights
Filter by Content Types
- No options
356 results found
ARMOR up with WWT... because AI is inside the wire
Security for AI represents an unprecedented challenge, but AI security practices are compounding the problem by slowing adoption, limiting utilization, and undermining the return on your AI investments. Learn how the "WWT ARMOR framrework" — developed with leading organizations and industry partners — can accelerate AI efforts, increase utilization, and unlock productivity to drive maximum value, all while enhancing security and governance.
*Lunch & Harbor Court Parking Validation Provided
Experience
•May 28, 2026 • 4pm
Hands-On Lab Workshop: Cisco AI Defense
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed to challenge and sharpen your AI security skills. The Cisco AI Defense CTF lab puts you in the middle of real-world AI threat scenarios, where you will exploit and defend against vulnerabilities including prompt injection, jailbreaking, and misuse of generative AI models. Watch Cisco AI Defense technology intercept and neutralize attacks in real time as you work through progressively challenging scenarios. This lab goes beyond surface-level awareness—giving you direct, practical experience with the tools and techniques used to secure enterprise AI environments.
Webinar
•May 7, 2026 • 11am
WWT - Mythos Response Framework
Join WWT for this webinar event around Mythos readiness content developed with security leaders across the sector — a prescriptive framework.
Mythos-class AI capabilities have moved a working assumption most vulnerability programs still rely on: that exploit development is slow enough for weekly or monthly patch cycles to keep pace. Median time-to-exploit is now measured in hours, and the barrier to weaponizing published CVEs has collapsed.
Rather than add to the noise, we've distilled the best public guidance into a 12-point response framework structured around three shifts: strengthen the foundation, move from vulnerability management to exploit prevention, and align people and partners. The attached one-pager lays it out in full, including a 30 / 90 / 365-day view.
Experience
•Apr 30, 2026 • 2:30pm
Why Enterprise AI Personalization Fails Without Data Ownership
AI has raised customer expectations, but most organizations are still delivering personalization in isolated moments instead of across the full customer journey. In this episode of the AI Proving Ground Podcast, WWT Chief Digital Advisor Ralph Jovine and Senior Director of Product for Unified Commerce Chris Douglas explain unpack the foundations leaders need to get right first: customer data ownership, governance, identity resolution, decisioning and operational alignment.
Video
•4:39
•Apr 29, 2026
Breaking Data Silos: How Private Inference Unlocks GPU ROI on Sensitive Data
Private inference applies Protopia AI's Stained Glass Transform (SGT) to convert sensitive prompts into stochastic embeddings inside the data owner's root of trust, enabling NVIDIA Triton, NIM, and vLLM deployments to process regulated data without exposing plaintext. Aligned with WWT's ARMOR framework, this architecture strengthens data protection, model security, and multi-tenant GPU infrastructure ROI.
Blog
•Apr 28, 2026
A Guide for CTOs to Get Started with Enterprise AI
This report gives CTOs a decision-making framework to build AI programs that are sequenced around business outcomes, governed before they scale and staffed for production.
WWT Research
•Apr 23, 2026
Partner POV | ExtraHop Delivers the Foundation for Secure AI Innovation Across the Agentic Enterprise
ExtraHop enhances AI security by offering comprehensive visibility and real-time observability, crucial for detecting threats and ensuring governance. As AI expands, traditional security tools falter, creating blind spots. ExtraHop's solution maps AI assets, monitors traffic, and enforces compliance, empowering enterprises to innovate safely and maintain control over autonomous workflows.
Partner Contribution
•Apr 23, 2026
WWT Innovation Vendor Spotlight - 7AI
You're invited to our next WWT Innovation Vendor Spotlight, featuring a special session with 7AI - a leader in agentic AI security for security operations.
7AI customers trust dynamic AI agents to get security work done at scale. The company's AI agents autonomously investigate security alerts, proven in production at Fortune 500 scale, eliminating the work humans shouldn't be doing so security teams can finally do human work: strategic threat hunting, proactive defense, and the work that actually protects organizations.
Experience
•Apr 22, 2026 • 11am
How Jack in the Box is Building the Data Foundation for AI
What does it really take to make AI useful in the enterprise? In this episode of the AI Proving Ground Podcast, Jack in the Box VP of Data and Analytics Paul Bruffett and WWT Managing Director of AI and Data Analytics Daniel Morrisroe detail how to turn fragmented data, legacy systems and disconnected workflows into an operational foundation the business can actually use. From modular data products and self-service analytics to forecasting, personalization and the road to more autonomous systems, this conversation offers practical lessons for leaders trying to move from modernization to measurable AI outcomes.
Video
•5:58
•Apr 21, 2026
Partner POV | Every Cursor Needs a Coder: Unblocking AI Coding Tools in the Enterprise
AI coding tools boost productivity but pose security risks when run locally, leading to governance challenges. Coder offers a solution with self-hosted environments, ensuring secure, scalable AI development. By integrating with existing security frameworks, Coder balances innovation with control, enabling enterprises to harness AI's potential without compromising security.
Partner Contribution
•Apr 21, 2026
Partner POV | What Is Lateral Movement in Cybersecurity?
Lateral movement in cybersecurity allows attackers to stealthily navigate networks post-breach, escalating privileges and accessing sensitive data. This technique transforms minor breaches into major threats. Understanding and preventing lateral movement through deep network visibility, Zero Trust, and least privilege access is crucial for safeguarding organizational assets.
Partner Contribution
•Apr 21, 2026
Partner POV | Network-Derived Telemetry Deemed 'Essential.' Who Knew?
Gartner's new reference architecture elevates network-level telemetry to a strategic necessity, emphasizing its role in enhancing service-level observability and security. By integrating network-derived insights, organizations can make faster decisions, reduce risks, and ensure resilient digital services, transforming telemetry from an afterthought to a foundational architectural element.
Partner Contribution
•Apr 20, 2026