Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

20 results found

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Cloud, FinOps and AI: What You Need to Know About Unit Economics, GPUs and the ROI Flywheel

AI has pushed cloud into overdrive. In this episode of the AI Proving Ground Podcast, two of our top cloud experts — Jack French and Todd Barron — reset the approach and detail why cloud is the launchpad but portability is the strategy; how to start greenfield with containers and abstraction; what a real FinOps model for AI looks like (unit economics, tagging, token/GPU visibility); where neo clouds fit versus hyperscalers; and how to handle cross-cloud risk and skill gaps; and the governance moves that accelerate—not restrict—innovation.
Video
•1:38
•Oct 14, 2025

Cisco Secure Cloud Control Lightboard Overview

Take a look at Cisco's new management tool that combines security controls for the cloud, services edge, applications, and large language models under a single view.
Video
•9:51
•Apr 8, 2025

AWS Inter-Regional With Direct Connect

AWS provides many options for inter-area connectivity to their resources. This video focuses on the AWS direct connect deployment that enables users to establish a direct, private connection between on-premises networks and AWS.
Video
•17:47
•Jan 24, 2025

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

Partner POV | Google Distributed Cloud air-gapped: Cloud Innovation On-Premises and at the Edge

Google Distributed Cloud air-gapped delivers a fully managed cloud experience for organizations that require complete isolation to meet stringent sovereignty and regulatory requirements. It does not require connectivity to Google Cloud or the public internet and comes with many of our leading AI technologies, to increase the value of your data, while keeping it secure.
Video
•1:25
•Feb 10, 2025

Netskope + Wiz Integration

Netskope is proud to announce our integration with Wiz, empowering users to proactively safeguard their resources across hyperscaler environments like never before.
Video
•4:00
•Sep 4, 2024

Network Access Control- 802.1X Lightboard

Walk through how 802.1X works on a network. What role the supplicant, authenticator, and authentication server play in 802.1X. How to deploy 802.1X, and recommendations for EAP (Extensible Authentication Protocol) in a network.
Video
•12:23
•Apr 8, 2025

Illumio Insights Overview

Cyber attackers are no longer just at the gates; they're already inside, moving stealthily across your complex hybrid multi-cloud environment. Traditional security tools flood you with data but lack the context needed to connect the dots, leaving attackers free to roam, steal data, and disrupt operations. Enter Illumio Insights, the first cloud detection and response solution built on the AI security graph. This breakthrough in AI-enriched observability, detection, and containment transforms traffic and workload data into actionable intelligence. Agentless and quick to deploy, it provides AI-enriched context for all resources, flows, and workloads, allowing you to dynamically quarantine threats with a single click. Built for cloud scale, Illumio Insights doesn't just find a needle in a haystack but every needle in every haystack, ensuring you have the answers you need.
Video
•1:23
•Jan 13, 2026

Wiz Operating Platform Demo

Learn about Wiz's simply intuitive user interface, built on the Wiz Security graph.
Video
•10:12
•Oct 30, 2024

Partner POV | Deep Instinct DSX for Cloud

DSX for Cloud – Amazon S3 prevents bad actors from breaching your cloud and hybrid-cloud storage and roots out lurking, unexecuted malware.
Video
•3:02
•Dec 16, 2024

CNAPP Explained: Simplifying Cloud-Native Security

In this lightboard session, we will take a look at the fundamental components of a Cloud-Native Application Protection Platform (CNAPP) to understand how it consolidates your cloud security architecture. You will see a breakdown of how Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), and Cloud Infrastructure Entitlement Management (CIEM) work together to provide a unified view of your environment and prioritize the most important issues first.
Video
•9:07
•Feb 13, 2026

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1151 Followers

At a glance

164Total
51Blogs
44Articles
24Labs
20Videos
10Learning Paths
7Case Studies
3Events
2Assessments
2Workshops
1WWT Research
What's related
  • Cloud
  • Security
  • ATC
  • Blog
  • Network Security
  • Cloud Strategy and Adoption
  • Security Operations
  • Application & API Security
  • AI Security
  • F5
  • AWS
  • Cloud Networking
  • Cybersecurity Risk & Strategy
  • Data Security
  • Networking
  • Wiz
  • F5 Application Delivery Contollers
  • Application Delivery Controllers
  • Automation
  • Cisco

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies