Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

57 results found

The Art of Conflict: Cyber at War - How Iran's Retaliation is Shaping Critical Infrastructure and Global Enterprise Risk

Iran's retaliation model signals a period of active cyber probing coupled with sustained infrastructure targeting rather than a one-time shock event.
Blog
•Mar 3, 2026

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

The State of Data Loss Prevention

Data Loss Prevention has regained prominence in recent years due to large scale breaches and increasingly stringent regulatory requirements. Vendors with varying tech heritages have been lining up to employ new technologies and techniques against this seemingly never-ending problem.
Blog
•Mar 31, 2025

Part 2- Bridging Kubernetes, Cilium & eBPF to Networking Concepts for Network Engineers

As cloud-native technologies continue to converge with traditional networking in the data center and enterprise, understanding how Kubernetes, Cilium and eBPF works is crucial for network engineers. With hybrid mesh firewalls being the latest trend, and distributed firewalls (like Cisco's Hypershield) emerging in the market. Understanding how Kubernetes transforms traditional IP networking concepts into a dynamic, software-defined environment is crucial. This article demystifies Kubernetes security, making it accessible for network engineers familiar with ACLs and VLANs. You may think this doesn't apply to you, but if you're planning a firewall refresh anytime soon, then these concepts will need to be part of your vernacular going forward.
Blog
•Mar 13, 2025

The Cloud Identity Crisis

In 2025, attackers shifted focus to credential harvesting and identity-based attacks, exploiting the surge in non-human identities (NHIs) in cloud environments. As NHIs outnumber human identities, organizations face increased risks. Effective identity governance, including Just-in-Time access and automation, is crucial for robust cloud security and minimizing operational exposure.
Blog
•Mar 27, 2026

The State of DDoS in 2024

Here, we explore the state of distributed denial-of-service (DDoS) attacks and mitigation in 2024: Where we've been, where we are today, and what must be considered in the future.
Blog
•Feb 13, 2024

Part 3- Bridging Kubernetes, Cilium & eBPF to Networking Concepts for Network Engineers

As cloud-native technologies continue to converge with traditional networking in the data center and enterprise, understanding how Kubernetes, Cilium and eBPF work is crucial for network engineers. Hybrid mesh firewalls are the latest trend, and distributed firewalls (like Cisco's Hypershield) are emerging in the market.
Blog
•Mar 13, 2025

InfoSecurity Europe 2022 Recap

Two WWT security experts share their key takeaways from InfoSec Europe — from the enhanced focus on the cloud and increased sophistication of attacks — and the ways we have to respond to threats and attacks — to WWT's station domination of Prince Regents.
Blog
•Jun 27, 2022

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

Part 1- Bridging Kubernetes, Cilium, & eBPF to Networking Concepts for Network Engineers

As cloud-native technologies continue to converge with traditional networking in the data center and enterprise, understanding how Kubernetes, Cilium and eBPF work is crucial for network engineers. Hybrid mesh firewalls are the latest trend, and distributed firewalls (like Cisco's Hypershield) are emerging in the market.
Blog
•Mar 6, 2025

Security vs. Privacy, the Difference is Epic

Cyber teams need to understand the difference between security and privacy and apply them to every system in production.
Blog
•Aug 9, 2024

Stop Treating Cloud Security Like a Post-Deployment Fire Drill

Cloud environments ship too fast for security reviews that happen after deployment. This post breaks down what DevSecOps and cloud workload security look like when they're actually integrated — security requirements defined before code is written, pipeline gates that enforce rather than just report, and runtime findings that feed back to the team that owns the workload. Security built in, not bolted on.
Blog
•Mar 23, 2026

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1153 Followers

At a glance

168Total
57Blogs
43Articles
21Labs
20Videos
12Learning Paths
8Case Studies
3Events
2Assessments
2Workshops
What's related
  • Cloud
  • Security
  • Blog
  • ATC
  • Network Security
  • AI Security
  • Security Operations
  • Cloud Strategy and Adoption
  • Cybersecurity Risk & Strategy
  • AWS
  • Cloud Networking
  • Application & API Security
  • Data Security
  • Networking
  • Wiz
  • F5
  • Automation
  • Google Cloud
  • Cisco
  • Endpoint Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies