Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Partners

Select a tab

25 results found

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

The MITRE ATT&CK Framework: A Beginner's Guide

As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024

PCI DSS 4, APIs and You - The Ostrich is Looking Around

The Payment Card Industry (PCI) Security Standards Council's Data Security Standard (DSS) 4.0, effective March 31, 2024, introduces significant updates with a focus on API security. It mandates broader code repository coverage, emphasizes secure development practices, and encourages early integration of security measures, marking a notable shift towards a proactive security culture in handling sensitive payment information.
Blog
•Feb 28, 2024

ASPM and API Security: Complementarity at its Finest

A continuation of our article series on the how ASPM and API security complement each other and provide complete code-to-runtime security for API.
Blog
•Feb 14, 2024

The Imperative Shift Left: How API Security is Redefining Traditional SecOps

In today's IT landscape, digital transformation is driving change in IT. We posit that API security will be the technology that will finally make the "shift left" a reality. Here's why.
Blog
•Mar 5, 2024

API Security and ASPM - A More Perfect Union

Learn how Application Security Posture Management (ASPM) and API Security are a more perfect union, and why the announcement of a technical alliance between Akamai and Apiiro is so exciting.
Blog
•Jan 18, 2024

Cybersecurity Platforms vs. Point Solutions: Swiss Army Knives or Precision Tools?

This first article in a 5-part series explores the difference between cybersecurity platforms and point solutions. It explains how platforms offer unified, scalable protection while point solutions deliver specialized, best-in-class capabilities. Using simple analogies, it shows how these approaches tackle complex business challenges, setting the stage for deeper dives in upcoming articles.
Blog
•Dec 5, 2024

The SSDAF - A Shot Across the AppSec Bow

The United States federal government has released the Secure Software Development Attestation Form (SSDAF), which signifies a new and stringent stance on secure software development practices.
Blog
•Apr 22, 2024

The Grizzled CyberVet: State of Network Security

Network security has evolved rapidly, with the field now embracing zero trust, AI-driven defenses and integrated platforms. The next five years will see AI, SASE and quantum-resistant cryptography reshape the landscape. Enterprises must consolidate tools, adopt AI automation and prioritize identity-first security to stay ahead of increasingly sophisticated cyber threats. Secure your future now.
Blog
•Feb 18, 2025

Security vs. Privacy, the Difference is Epic

Cyber teams need to understand the difference between security and privacy and apply them to every system in production.
Blog
•Aug 9, 2024

PCI DSS 4.0 and ASPM: Resistance is Futile

The Payment Card Industry Data Security Standard (PCI DSS) 4.0 introduces new requirements for application security teams, emphasizing the need for continuous and proactive approaches to application security.
Blog
•Mar 21, 2024

Harness the Power of Azure with NGINXaaS – Advanced Load Balancing and API Gateway

This blog explains how modern, API-driven applications demand cloud-native security and highlights how F5 NGINXaaS for Azure delivers a fully managed, high-performance WAF to protect them. It outlines key capabilities such as OWASP Top 10 defenses, API security, DevSecOps integration and Azure-native observability, helping enterprises secure apps and APIs without hardware or operational overhead.
Blog
•Jan 20, 2026

Application & API Security

As the industry shifts from monolithic to microservices-based applications, fortify your application and API landscapes against emerging threats and vulnerabilities.

26 Followers

At a glance

91Total
25Blogs
23Articles
18Videos
17Labs
4Events
1Briefing
1Case Study
1Learning Path
1Playlist
What's related
  • Security
  • F5
  • Cloud
  • Cloud Security
  • AI Security
  • ATC
  • Blog
  • WWT Presents
  • F5 Distributed Cloud
  • Network Security
  • F5 Application Delivery Contollers
  • Akamai
  • Cybersecurity Risk & Strategy
  • F5 Automation
  • Networking
  • AI & Data
  • Application Delivery Controllers
  • Cyber Range
  • Security Operations
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies