Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Cloud Marketplace Assessment

It is increasingly critical for IT organizations to manage their cloud commitments with public cloud service providers in a predictable and measurable way. Without the right processes in place, IT's ability to deliver on its consumption commitments can be quickly overextended. WWT's Cloud Marketplace Assessment is a cost-effective way to optimize your software procurement processes.
Assessment

WWT Innovation Vendor Spotlight: Cerby

Welcome to the inaugural WWT Innovation Vendor Spotlight, a monthly series where WWT features forward-thinking companies and their groundbreaking solutions. This month, we are highlighting Cerby, which is introducing new and exciting capabilities to the identity and access management (IAM) space. Please register through your work email as registrants through personal accounts will be removed. All registrants will receive a $5 Starbucks gift card. All attendees will receive a $20 Doordash / UberEats gift card. Gift Card Eligibility Starbucks and DoorDash gift cards are available for qualified attendees. To receive the DoorDash gift card, participants must attend the full webinar. Cerby and WWT reserves the right to determine eligibility.
Experience
Sep 17, 2025 • 10:30am

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

The Cloud Advantage for AI

Discover how leveraging the cloud can help organizations accelerate AI adoption.
Article
•Apr 22, 2025

Infoblox DNS Management & Federated IPAM for Multi-Cloud Environments

This learning path provides a comprehensive introduction to Infoblox's integrated DNS, and IP Address Management solution, with a focus multi-cloud environments. Through structured modules—including a video, an article, & a hands-on labs—participants will gain practical experience with core capabilities such as centralized IPAM, cross-cloud DNS synchronization, federated governance, and policy-based automation.
Learning Path

What's new

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

AWS Identity and Access Management Lab

This lab is designed to give the user hands-on experience working with the AWS Identity and Access Management Service. The lab walks the user through creating groups and users and then working with permissions in the AWS CLI and Management console.
Foundations Lab
•97 launches

The Life of a Security Girl

In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025

Data Security Use Cases and Emerging Trends

This learning path covers data security strategies, real-world use cases, and emerging trends shaping the future of data & cyber security. This learning path also covers foundational principles, advanced threat mitigation, & the various data protection technologies.
Learning Path

Cloud, FinOps and AI: What You Need to Know About Unit Economics, GPUs and the ROI Flywheel

AI has pushed cloud into overdrive. In this episode of the AI Proving Ground Podcast, two of our top cloud experts — Jack French and Todd Barron — reset the approach and detail why cloud is the launchpad but portability is the strategy; how to start greenfield with containers and abstraction; what a real FinOps model for AI looks like (unit economics, tagging, token/GPU visibility); where neo clouds fit versus hyperscalers; and how to handle cross-cloud risk and skill gaps; and the governance moves that accelerate—not restrict—innovation.
Video
•1:38
•Oct 14, 2025

Partner POV | Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•270 launches

Infoblox DNS Management & Federated IPAM for Multi-Cloud Environments

This learning path provides a comprehensive introduction to Infoblox's integrated DNS, and IP Address Management solution, with a focus multi-cloud environments. Through structured modules—including a video, an article, & a hands-on labs—participants will gain practical experience with core capabilities such as centralized IPAM, cross-cloud DNS synchronization, federated governance, and policy-based automation.
Learning Path

Partner POV | Emulating the air-gapped experience: GDC Sandbox is now generally available

Google Distributed Cloud (GDC) Sandbox - AI Optimized offers a secure, virtualized environment for developing generative AI applications in regulated industries. By emulating air-gapped infrastructure, it enables innovation while ensuring compliance and security. This platform accelerates AI adoption, bridging the gap between advanced capabilities and stringent regulatory requirements.
Partner Contribution
•Sep 30, 2025

Cloud Security: Announcements from Fal.con 2025

Crowdstrike continues to add new features to their platform, making Falcon Cloud Security a top contender when enterprises consider how they are going to secure their cloud investment, including AI applications in the cloud.
Blog
•Sep 29, 2025

Partner POV | SentinelOne: AI-Driven & Unified Cloud Security

Organizations face a perfect storm of security challenges with AI-driven attacks exploiting cloud vulnerabilities. SentinelOne's AI-powered CNAPP offers a unified, proactive defense, transforming cloud security with comprehensive visibility, autonomous threat protection, and automated remediation. This paradigm shift empowers security teams to respond swiftly and confidently, ensuring a resilient cloud environment.
Partner Contribution
•Sep 24, 2025

WWT Innovation Vendor Spotlight: Cerby

Welcome to the inaugural WWT Innovation Vendor Spotlight, a monthly series where WWT features forward-thinking companies and their groundbreaking solutions. This month, we are highlighting Cerby, which is introducing new and exciting capabilities to the identity and access management (IAM) space. Please register through your work email as registrants through personal accounts will be removed. All registrants will receive a $5 Starbucks gift card. All attendees will receive a $20 Doordash / UberEats gift card. Gift Card Eligibility Starbucks and DoorDash gift cards are available for qualified attendees. To receive the DoorDash gift card, participants must attend the full webinar. Cerby and WWT reserves the right to determine eligibility.
Experience
•Sep 17, 2025 • 10:30am

Partner POV | Varonis Acquires SlashNext, AI-Native Email Security

Varonis acquires SlashNext, integrating its AI-driven phishing detection into their Data Security Platform. This strategic move enhances threat detection from email to data, offering comprehensive protection against sophisticated social engineering attacks. By connecting email, identity, and data, Varonis aims to revolutionize data security and stop breaches before they begin.
Partner Contribution
•Sep 10, 2025

SentinelOne's Singularity Cloud Security Overview

Blocking an Attack in Under One Minute
Video
•1:39
•Sep 9, 2025

Has Cloud Security Reached Its Breaking Point?

Cloud security faces unprecedented threats as AI, quantum computing and multi-cloud complexities converge. With 95 percent of organizations breached, systemic failure looms. Urgent architectural changes and cultural shifts are essential to avert catastrophe. Will businesses adapt in time, or will cloud computing become technology's greatest security failure?
Blog
•Sep 5, 2025

Google Cloud Core Infrastructure

The Google Cloud Associate Learning Path is designed to provide a structured, hands-on approach to mastering foundational and intermediate cloud concepts. This learning path covers essential topics such as cloud computing principles, Google Cloud services, infrastructure models (IaaS, PaaS, SaaS), networking, security, and cost optimization. Through a mix of theoretical lessons and practical labs, learners will develop the skills needed to deploy, manage, and troubleshoot cloud-based applications. Whether you're new to cloud computing or looking to solidify your expertise, this learning path prepares you for real-world cloud challenges.
Learning Path

Black Hat Ignites Under Vegas Lights

When asked about advocacy, WWT's Kate Kuehn defined it as helping leaders cut through the noise, balancing opportunity with risk, and moving beyond the myth of a magic pill solution.
News
•Aug 27, 2025

Secure Cloud: Complete - Uncover Risks in the Cloud

Secure Cloud: Complete offers a 21-day analysis of your cloud environment, enhancing visibility and security through integrated tools like Wiz, Cyera and Illumio. This unified accelerator identifies risks, maps data and visualizes traffic, empowering organizations to refine cloud strategies and accelerate digital initiatives without disrupting existing operations.
Blog
•Aug 21, 2025

Getting Started with NGINX One

Explore NGINX One, an all-in-one platform that integrates the best of NGINX's offerings into a unified package that includes a cloud-based dashboard and access to F5 Distributed Cloud. Customers get advanced load balancing, web and application server capabilities, API gateway functionalities, and security features. The goal of NGINX One is to provide unparalleled performance, security, and scalability for modern applications, whether they are deployed in the cloud, on-premises, or in hybrid environments.
Foundations Lab
•24 launches

The State of Cloud Security: As Told by CrowdStrike

In 2025, CrowdStrike's Global Threat Report reveals cyber adversaries adopting business-like efficiency, especially in cloud environments. Scattered Spider, a notorious group, inspires others, leading to a surge in cloud intrusions. CrowdStrike's Falcon Cloud Security offers robust solutions, integrating threat detection and proactive measures to combat these evolving threats.
Blog
•Aug 4, 2025

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1150 Followers

At a glance

181Total
54Articles
46Blogs
29Videos
17Labs
10Learning Paths
7Case Studies
6Events
4Assessments
4Workshops
2Briefings
1Playlist
1WWT Research
What's related
  • Cloud
  • Security
  • Blog
  • Network Security
  • ATC
  • Cloud Strategy and Adoption
  • Cybersecurity Risk & Strategy
  • Security Operations
  • Application & API Security
  • AWS
  • Data Security
  • AI Security
  • Cisco
  • F5
  • Wiz
  • Cloud Networking
  • Networking
  • Microsoft
  • Automation
  • Data Center

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies