Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

What's popular

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025
WWT Research
•Jan 1, 2025

Top Security Insights and Trends

The cybersecurity landscape has evolved over the course of 2024. In this Research Note, WWT's cybersecurity leaders provide their insights about AI security, resilience strategies, data management and more to help you stay ahead of emerging threats and know where to focus your resources for the rest of the year.
WWT Research
•Aug 15, 2024

Think Beyond Disaster: Driving Cyber Recovery in the Data Center | Research

As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery. Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Webinar
Jul 24, 2024 • 9am

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Steps for Driving Cyber Resiliency Enterprise-Wide | Research

We've heard it time and time again: It's not if, but when you'll get hacked. Accepting that reality requires you and your security teams shift your focus from prevention to recovery. Watch Kate Kuehn, WWT's Global Head of Cyber Advocacy, talk about how you can drive cyber resiliency – from the practitioner level all the way up through the board room.
Webinar
May 23, 2024 • 9am

What's new

Cyber Insights Report - May 19, 2025

The M&S cyber attack reveals a shift from data theft to operational disruption, highlighting vulnerabilities in legacy systems. This breach underscores the need for cyber resiliencee over mere defense, challenging businesses to rethink continuity strategies amid rising AI threats and regulatory pressures. Resilience, not just protection, is the new imperative.
Blog
•May 19, 2025

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Beyond the Booth: WWT & Intel at Rocky Mountain Cyberspace Symposium

Discover key insights from the Rocky Mountain Cyber Symposium, where Keith Linenberger from WWT and Jason Dunn-Potter from Intel address pressing cyber threats to the Department of Defense and the innovative solutions being developed. This session highlights the collaboration between WWT and Intel, focusing on AI-driven security, advanced tactical edge computing and resilient cybersecurity systems.
Video
•14:05
•Apr 1, 2025

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

What would happen if your business suffered a major cyber attack today? Most organizations aren't ready. But yours can be. In this powerful discussion, WWT cybersecurity experts Kate Kuehn and Angela Brandt reveal how businesses can stay operational through inevitable cyber incidents. Learn why AI-driven threats, internal mistakes, and system malfunctions are reshaping security strategies and how you can build a resilient business that doesn't just survive, but thrives in the face of disruption.
Video
•1:27
•Mar 24, 2025

Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
•Mar 20, 2025 • 11am

Partner POV | Microsoft 365 Ransomware: Your Comprehensive Guide to Understanding, Prevention, and Recovery

Get a complete understanding for Microsoft 365 ransomware. Learn how M365 attacks occur, preventative measures, and steps to take for prevention and recovery.
Partner Contribution
•Mar 19, 2025

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

Partner POV | DORA is Live. Are Financial Services Companies Ready to Prove Their Resilience?

Crucial legislation brings a new level of rigor and accountability in the EU
Partner Contribution
•Mar 7, 2025

Hour of Cyber: Cyber Resilience

As cyber threats grow more sophisticated, maintaining operational integrity is crucial. Cyber resilience goes beyond prevention, focusing on the ability to anticipate, withstand, recover and adapt to cyber disruptions. A key aspect of this resilience is robust data protection, ensuring the confidentiality, integrity and availability of sensitive information. Effective data protection helps prevent unauthorized access, loss or tampering, enabling quick recovery while preserving trust and compliance. Achieving true resilience requires a holistic approach, with data protection as a core component to ensure mission-critical operations continue seamlessly.
Briefing

Think Beyond Disaster: Driving Cyber Recovery in the Data Center

As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery. Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Video
•2:23
•Mar 3, 2025

Partner POV | Cyber Threat Landscape Q&A with Trellix Head of Threat Intelligence John Fokker

In 2024, the cyber landscape shifted with more law enforcement actions, smaller ransomware groups, GenAI-driven misinformation, and rising hacktivism, leading to increased threats like data-targeting ransomware and disruption-driven attacks.
Partner Contribution
•Feb 19, 2025

Digital Disasters: How Does Cyber Resilience Differ from Conventional Disaster Recovery?

Learn the key distinctions between conventional disaster recovery (DR) frameworks and the specialized tactics required for cyber resilience (CR), particularly when faced with ransomware.
Article
•Feb 4, 2025

Partner POV | Understanding and Leveraging the Role of Platformization in AI-First Cybersecurity

The convergence of cybersecurity and AI is reshaping defenses and attacks alike. Platformization, integrating multiple tools into a unified system, offers a solution to manage complexity and enhance security. Palo Alto Networks' Precision AI exemplifies this approach, providing robust, automated, and contextually aware cybersecurity solutions for modern threats.
Partner Contribution
•Feb 4, 2025

Exploring Veeam Kasten for Kubernetes

This lab introduces Veeam Kasten for Kubernetes, guiding learners through its interface, backup policy creation, and application restoration. Additionally, it explores blueprints and transform sets, equipping users with essential skills for efficient Kubernetes data management.
Foundations Lab
•114 launches

Cyber Resiliency Matters

Cyber Resilience is key to an organization's risk management and rapid response strategy. What is it and why is it important? WWT's Jill Cochrane explains here as she discusses why Cyber Resilience is important and makes the case for investments in Cyber Resilience.
Video
•5:36
•Jan 10, 2025

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025
WWT Research
•Jan 1, 2025

Adopt a Hacker Mentality to Stay Ahead of the Cyber Curve | Experts

Today's threat landscape is broader than ever and cyberattacks are growing in volume and sophistication each and every day. In fact, hackers are launching new assaults at a clip of greater than one every minute of the day. Yet an alarming number of business leaders feel ill-prepared in the event a cyberattack hits their company. How can this be given the stakes involved? Join WWT Cyber Range Architect Brett Turner as he discusses what cyber threats pose the greatest risks to organizations this year and how companies can best address the expanding talent gap taking place in the cyber industry. Brett also talks about what it takes to become an ethical hacker and why dynamic, live-fire cyber exercises called Cyber Ranges could be your best bet to standing up to cyber criminals moving forward.
Video
•0:17
•Dec 17, 2024

Partner POV | Rubrik Security Cloud: There is No Cybersecurity Without Cyber Resilience

All businesses should take the steps to embrace a cyber resilience mindset before, during, and after a cyberattack
Partner Contribution
•Dec 16, 2024

Preparing for DORA Compliance with Pure Storage and Commvault?

WWT's take on the new DORA compliance joint solution brief from Pure Storage and Commvault that aims to help customers meet requirements and will aid in your cyber resiliency plan.
Blog
•Dec 10, 2024

Reflecting on 2024: A Defining Year for Cybersecurity

Insights on navigating a rapidly evolving cybersecurity landscape with strategy and innovation.
Blog
•Dec 5, 2024

Cyber Resilience

Cyber resilience is the ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises of cyber resources.

373 Followers

At a glance

110Total
39Articles
26Blogs
25Videos
10Events
3Case Studies
2Workshops
2WWT Research
1Briefing
1Lab
1Learning Path
What's related
  • Security
  • Data Center
  • Data Protection & Cyber Recovery
  • Cybersecurity Risk & Strategy
  • WWT Presents
  • Blog
  • Security Operations
  • AI Security
  • AI & Data
  • Cloud
  • Commvault
  • Healthcare
  • Rubrik
  • AI Solutions
  • Financial Services
  • Fortinet
  • Public Sector
  • WWT Presents Partner Spotlight
  • Cloud Security
  • Data Analytics

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies