Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Partners

Select a tab

What's popular

Securing AI When Agents Move Faster Than Humans Can Respond

AI security is entering a new phase where models like Anthropic's Mythos are becoming more capable and agentic systems can take action across enterprise environments. The risk is no longer just bad answers or hallucinations. It is speed, scope and blast radius. In this episode of the AI Proving Ground Podcast, WWT security leaders Jillian Nix-Anderson and Istvan Berko explore how organizations can secure themselves in the agentic AI era, where vulnerability discovery, response timelines and operational complexity are all accelerating. And they talk about how WWT's ARMOR framework helps teams structure the conversation across infrastructure, models, data, software development, operations and compliance.
Video
•7:12
•May 20, 2026
ATC+

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•Advanced
37 launches
ATC+

F5 Distributed Cloud (XC) Application Security with Terraform

In this lab, users will experience F5 Distributed Cloud Web App and API protection (WAAP), where organizations can simplify their path to effective security without sacrificing continued business innovation and customer demand. An API-driven approach to application protection enables improved collaboration between networks, security operations, and developers. This lab will use Terraform to deploy a Web App and API protection solution that protects an existing application
Advanced Configuration Lab
•Advanced
54 launches
ATC+

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•Advanced
181 launches

The AI Factory Revolution: Engineering Away Resource Contention with F5, NVIDIA & WWT

Artificial intelligence (AI) has created unprecedented demand for computing resources, causing strain on existing infrastructure and creating bottlenecks that limit business transformation. AI factories are large-scale infrastructure for organizations looking to harness AI capabilities while managing resource constraints. NVIDIA's AI capabilities, F5's application security and delivery solutions, and WWT's consulting expertise create a powerful solution.
Article
•Apr 11, 2025

What's new

Securing AI When Agents Move Faster Than Humans Can Respond

AI security is entering a new phase where models like Anthropic's Mythos are becoming more capable and agentic systems can take action across enterprise environments. The risk is no longer just bad answers or hallucinations. It is speed, scope and blast radius. In this episode of the AI Proving Ground Podcast, WWT security leaders Jillian Nix-Anderson and Istvan Berko explore how organizations can secure themselves in the agentic AI era, where vulnerability discovery, response timelines and operational complexity are all accelerating. And they talk about how WWT's ARMOR framework helps teams structure the conversation across infrastructure, models, data, software development, operations and compliance.
Video
•7:12
•May 20, 2026

Partner POV | Stop Watching. Start Building: Master Cloudflare Application Security in a Live Sandbox.

Dive into Cloudflare's Schedulable Labs for an immersive, hands-on security experience. Master multi-layered defenses, from DNS to AI firewalls, and transform theory into practice. Limited to 8 participants, this workshop offers real-world attack simulations and automation techniques to enhance operational efficiency and modern threat protection. Secure your spot today.
Partner Contribution
•Apr 28, 2026

Partner POV | Securing AI Application Development

AI development is booming, yet security lags behind. With sensitive data flowing unchecked through repositories, wikis, and collaboration tools, the risk of exposure is high. Varonis offers comprehensive security solutions, ensuring AI systems remain protected throughout their lifecycle by addressing vulnerabilities in data access, permissions, and external sharing.
Partner Contribution
•Apr 28, 2026

Partner POV | Understanding and Reducing AI Risk in Modern Applications

Organizations must navigate the complex landscape of AI security by identifying interconnected risks across infrastructure, models, data, and applications. Real AI risk emerges from the interaction of these components, not isolated weaknesses. Wiz's comprehensive detection and analysis capabilities enable security teams to uncover and mitigate these risks, ensuring safe AI deployment.
Partner Contribution
•Mar 30, 2026

Partner POV | Seeing AI Clearly: Building Visibility Across Modern AI Applications

AI applications are evolving ecosystems, challenging traditional security visibility. Wiz offers a comprehensive approach by integrating multiple detection methods, providing a unified view of AI systems across environments. This enhanced visibility is crucial for understanding AI applications, ensuring security, and identifying potential risks in dynamic, decentralized AI landscapes.
Partner Contribution
•Mar 24, 2026

JuicedShop Security Lab Series: Identification and Authentication Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•27 launches

JuicedShop Security Lab Series: Server-Side Request Forgery (SSRF)

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•18 launches

JuicedShop Security Lab Series: Logging and Monitoring Failures

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•13 launches

Partner POV | East-West Is the New North-South: Rethink Security for the AI-Driven Data Center

In AI-driven data centers, traditional perimeter security is obsolete as east-west traffic dominates. This shift necessitates microsegmentation to secure internal communications, reduce attack surfaces, and ensure compliance. Akamai Guardicore Segmentation with Aruba CX 10000 offers real-time, in-fabric enforcement, optimizing security for modern applications and AI workloads.
Partner Contribution
•Feb 12, 2026

Accelerating Kubernetes Ingress and Security Automation with F5 and WWT

This blog highlights automated deployment patterns of F5 NGINX Ingress Controller paired with F5 NGINX App Protect across Amazon Web Services, Google Cloud Platform and Microsoft Azure.
Blog
•Feb 11, 2026
ATC+

Cisco Secure DDOS Protection Lab

Cloud DDoS Protection is a cloud-delivered Cisco security solution that monitors network traffic and intelligently diverts malicious traffic when the network comes under attack. Cloud DDoS Protection enhances business resilience and ensures the availability of the network and applications. It reduces risk for organizations by giving them the ability to maintain uptime, meet SLAs and ensure that the network is available to legitimate users when under attack.
Advanced Configuration Lab
•Intermediate
•58 launches

Comprehensive Guide to OWASP Top 10: Web Applications, APIs and Automated Threats

The Open Web Application Security Project (OWASP) provides industry-standard frameworks for identifying and mitigating the most critical security risks facing modern applications. This guide explores three critical OWASP initiatives and maps F5's Web Application and API Protection (WAAP) solutions to each threat category. What You'll Learn: * OWASP Web Application Security Top 10 (2021) * OWASP API Security Top 10 (2023) * OWASP Automated Threats to Web Applications (21 threat types) * How F5 solutions protect against each threat category * Hands-on lab exercises to practice defense techniques
Blog
•Jan 27, 2026

Harness the Power of Azure with NGINXaaS – Advanced Load Balancing and API Gateway

This blog explains how modern, API-driven applications demand cloud-native security and highlights how F5 NGINXaaS for Azure delivers a fully managed, high-performance WAF to protect them. It outlines key capabilities such as OWASP Top 10 defenses, API security, DevSecOps integration and Azure-native observability, helping enterprises secure apps and APIs without hardware or operational overhead.
Blog
•Jan 20, 2026

Partner POV | The Year in Review 2025: AI, APIs, and a Whole Lot of Audacity

In 2025, AI-driven cyberattacks surged, challenging traditional defenses and highlighting the need for robust cybersecurity strategies. As threats evolve, organizations must prioritize AI literacy, API security, and resilience against sophisticated attacks. Looking to 2026, the focus shifts to managing AI risks, understanding attacker motivations, and enhancing cross-team communication for effective incident response.
Partner Contribution
•Jan 5, 2026

JuicedShop Security Lab Series: Injection Attacks

The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•Advanced
•99 launches
ATC+

F5 Distributed Cloud on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•Advanced
•33 launches
ATC+

F5 Distributed Cloud for LLMs

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•Advanced
•37 launches
ATC+

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•Advanced
•181 launches

Partner POV | Bots Are Evolving: Here's How to Stop AI-Powered Automation Before It Stops You

AI-driven bots now mimic human behavior so convincingly that detection is challenging, making recognition and reporting of scams crucial. As bots evolve, a layered defense combining technology and human vigilance is essential. By sharing intelligence and enhancing awareness, organizations can outpace these threats and maintain trust.
Partner Contribution
•Dec 1, 2025

Partner POV | Smarter Threats Need Smarter Defenses: AI, APIs, & Critical Infrastructure Security

AI accelerates cyber threats, expanding attack surfaces in critical infrastructure through APIs. As AI adoption grows, so do vulnerabilities, demanding smarter defenses. Organizations must prioritize real-time anomaly detection, automated containment, and proactive testing to secure data and systems. In the AI era, speed and adaptability are crucial for cybersecurity resilience.
Partner Contribution
•Oct 30, 2025

Application & API Security

As the industry shifts from monolithic to microservices-based applications, fortify your application and API landscapes against emerging threats and vulnerabilities.

31 Followers

At a glance

91Total
26Blogs
23Articles
19Videos
15Labs
4Events
1Briefing
1Case Study
1Learning Path
1Playlist
What's related
  • Security
  • AI Security
  • F5
  • Blog
  • Cloud
  • Network Security
  • ATC
  • Cloud Security
  • WWT Presents
  • Akamai
  • Cybersecurity Risk & Strategy
  • Cyber Range
  • AI & Data
  • F5 Application Delivery Contollers
  • Networking
  • Security Operations
  • Application Delivery Controllers
  • F5 Distributed Cloud
  • F5 Automation
  • Applied AI

What's related

WWT
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies