Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

What's popular

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025.
WWT Research
•Jan 1, 2025

Ransomware, Recovery and Resilience: How Commvault and Pure Storage Simplify Cyber Recovery

The enterprise data landscape has changed dramatically. Ransomware is no longer a distant risk — it's the defining challenge distorting how organizations think about backup, recovery, and resilience. At the same time, data volumes are exploding, regulatory pressure is intensifying, and cyber insurance carriers are raising the bar on what a "viable recovery plan" looks like.
Webinar
Sep 25, 2025 • 9am

AI Won't Save You: Easterly, Joyce and CISOs on the Cybersecurity Reality No One Wants to Hear

At a time when AI feels like oxygen — powering every tool, every conversation, every strategy — security leaders at the forefront are sounding the alarm: it won't fix the fundamentals. In this episode, top voices from government, industry and the next generation of cyber talent share unfiltered perspectives on AI-augmented threats, the velocity of attacks and what it really takes to defend in 2025 and beyond. Interviews include former CISA Director Jen Easterly, former NSA Cybersecurity Director Rob Joyce and a bevy of cyber experts from inside and out of WWT.
Video
•1:10
Aug 19, 2025

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

What would happen if your business suffered a major cyber attack today? Most organizations aren't ready. But yours can be. In this powerful discussion, WWT cybersecurity experts Kate Kuehn and Angela Brandt reveal how businesses can stay operational through inevitable cyber incidents. Learn why AI-driven threats, internal mistakes, and system malfunctions are reshaping security strategies and how you can build a resilient business that doesn't just survive, but thrives in the face of disruption.
Video
•1:27
Mar 24, 2025

Cyber Insurance: The Impact of Digital Risk, Key Takeaways from Black Hat 2025 and What Lies Ahead…

As we reflect on Black Hat 2025, cyber insurance again was one of the main themes, and the biggest take away, loud and clear is that we, as an industry, need to rethink the role of cyber insurance. It is no longer just a financial product, but rather, a strategic instrument—one that reflects the maturity of our security programs, the resilience of our operations, and our ability to quantify and communicate risk. When used correctly, it becomes a powerful weapon in our overall digital resilience lifecycle.
Blog
•Aug 18, 2025

What's new

Cyber Resilience Maturity Model

A roadmap to assess, evolve and future-proof your cyber resilience posture
WWT Research
•Sep 29, 2025

Vital cyber data-sharing law appears likely to expire amid looming government shutdown

Nextgov/FCW: Law firms are advising clients to prepare for this possibility, although the extent of information sharing that will cease if the law lapses remains unclear.
News
•Sep 26, 2025

Ransomware, Recovery and Resilience: How Commvault and Pure Storage Simplify Cyber Recovery

The enterprise data landscape has changed dramatically. Ransomware is no longer a distant risk — it's the defining challenge distorting how organizations think about backup, recovery, and resilience. At the same time, data volumes are exploding, regulatory pressure is intensifying, and cyber insurance carriers are raising the bar on what a "viable recovery plan" looks like.
Webinar
•Sep 25, 2025 • 9am

Partner POV | Rubrik: The Future of Cyber Resilience in Google Cloud

Rubrik's innovative solutions enhance data protection, security, and cost efficiency, empowering businesses to optimize their cloud investments while safeguarding against cyber threats. Discover how Rubrik transforms cloud data management for a resilient future.
Partner Contribution
•Sep 5, 2025

Scattered Spider and the Insurance Industry

Scattered Spider exploits the insurance industry's vulnerabilities through advanced social engineering, targeting legacy systems and human weaknesses. As cyber threats evolve, insurers must transition from prevention to resilience, focusing on rapid detection and response. The industry's future hinges on integrating technology, processes and human awareness to thwart these sophisticated attacks.
Blog
•Aug 31, 2025

AI Won't Save You: Easterly, Joyce and CISOs on the Cybersecurity Reality No One Wants to Hear

At a time when AI feels like oxygen — powering every tool, every conversation, every strategy — security leaders at the forefront are sounding the alarm: it won't fix the fundamentals. In this episode, top voices from government, industry and the next generation of cyber talent share unfiltered perspectives on AI-augmented threats, the velocity of attacks and what it really takes to defend in 2025 and beyond. Interviews include former CISA Director Jen Easterly, former NSA Cybersecurity Director Rob Joyce and a bevy of cyber experts from inside and out of WWT.
Video
•1:10
•Aug 19, 2025

Cyber Insurance: The Impact of Digital Risk, Key Takeaways from Black Hat 2025 and What Lies Ahead…

As we reflect on Black Hat 2025, cyber insurance again was one of the main themes, and the biggest take away, loud and clear is that we, as an industry, need to rethink the role of cyber insurance. It is no longer just a financial product, but rather, a strategic instrument—one that reflects the maturity of our security programs, the resilience of our operations, and our ability to quantify and communicate risk. When used correctly, it becomes a powerful weapon in our overall digital resilience lifecycle.
Blog
•Aug 18, 2025

Partner POV | Modernizing Financial Cybersecurity: From Reactive to Resilient

In the high-stakes world of finance, cybersecurity is paramount. As cyber threats evolve, financial institutions must adopt advanced defenses, comply with stringent regulations, and maintain customer trust.
Partner Contribution
•Aug 14, 2025

Partner POV | When You Can't Prevent the Unpreventable, Your Recovery Strategy Must Start Before an Attack

In a world where cyberattacks are inevitable, Rubrik's Preemptive Recovery Engine shifts the focus from prevention to rapid recovery. By integrating continuous threat analysis and automated recovery, it ensures businesses can swiftly bounce back, safeguarding continuity and trust. Are you prepared to recover faster than your attackers can adapt?
Partner Contribution
•Aug 11, 2025

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

Partner POV | Transforming Recovery Operations: Pure Storage and Commvault's Partnership in Cyber Resilience

Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads.
Partner Contribution
•Jun 27, 2025

Strengthening Operational Resilience Through Effective Prioritization and Recovery Strategies

Financial institutions face an operational resilience crisis due to cyber threats and regulatory demands. WWT offers a framework for prioritizing applications, recovery strategies and insights and integrating cyber threats with operational resilience, guided by global and Canadian regulations.
Blog
•Jun 19, 2025

From Idea to Outcome: How WWT Is Leading the AI Security Conversation at Scale

"Security isn't just the CISO's job anymore. It's an executive priority that touches everything from customer data to global compliance."
News
•Jun 5, 2025

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Beyond the Booth: WWT & Intel at Rocky Mountain Cyberspace Symposium

Discover key insights from the Rocky Mountain Cyber Symposium, where Keith Linenberger from WWT and Jason Dunn-Potter from Intel address pressing cyber threats to the Department of Defense and the innovative solutions being developed. This session highlights the collaboration between WWT and Intel, focusing on AI-driven security, advanced tactical edge computing and resilient cybersecurity systems.
Video
•14:05
•Apr 1, 2025

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

What would happen if your business suffered a major cyber attack today? Most organizations aren't ready. But yours can be. In this powerful discussion, WWT cybersecurity experts Kate Kuehn and Angela Brandt reveal how businesses can stay operational through inevitable cyber incidents. Learn why AI-driven threats, internal mistakes, and system malfunctions are reshaping security strategies and how you can build a resilient business that doesn't just survive, but thrives in the face of disruption.
Video
•1:27
•Mar 24, 2025

Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
•Mar 20, 2025 • 11am

Partner POV | Microsoft 365 Ransomware: Your Comprehensive Guide to Understanding, Prevention, and Recovery

Get a complete understanding for Microsoft 365 ransomware. Learn how M365 attacks occur, preventative measures, and steps to take for prevention and recovery.
Partner Contribution
•Mar 19, 2025

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

Partner POV | DORA is Live. Are Financial Services Companies Ready to Prove Their Resilience?

Crucial legislation brings a new level of rigor and accountability in the EU
Partner Contribution
•Mar 7, 2025

Cyber Resilience

Cyber resilience is the ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises of cyber resources.

392 Followers

At a glance

116Total
41Articles
28Blogs
25Videos
11Events
3Case Studies
3WWT Research
2Workshops
1Briefing
1Lab
1Learning Path
What's related
  • Security
  • Data Center
  • Data Protection & Cyber Recovery
  • Cybersecurity Risk & Strategy
  • WWT Presents
  • Blog
  • Security Operations
  • AI Security
  • AI & Data
  • Commvault
  • Rubrik
  • Cloud
  • Commvault Cyber Resilience
  • Financial Services
  • Healthcare
  • Applied AI
  • Public Sector
  • WWT Presents Partner Spotlight
  • Cohesity
  • Fortinet

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies