Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

What's popular

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025.
WWT Research
•Jan 1, 2025

AI Won't Save You: Easterly, Joyce and CISOs on the Cybersecurity Reality No One Wants to Hear

At a time when AI feels like oxygen — powering every tool, every conversation, every strategy — security leaders at the forefront are sounding the alarm: it won't fix the fundamentals. In this episode, top voices from government, industry and the next generation of cyber talent share unfiltered perspectives on AI-augmented threats, the velocity of attacks and what it really takes to defend in 2025 and beyond. Interviews include former CISA Director Jen Easterly, former NSA Cybersecurity Director Rob Joyce and a bevy of cyber experts from inside and out of WWT.
Video
•1:10
Aug 19, 2025

Cyber Insurance: The Impact of Digital Risk, Key Takeaways from Black Hat 2025 and What Lies Ahead…

As we reflect on Black Hat 2025, cyber insurance again was one of the main themes, and the biggest take away, loud and clear is that we, as an industry, need to rethink the role of cyber insurance. It is no longer just a financial product, but rather, a strategic instrument—one that reflects the maturity of our security programs, the resilience of our operations, and our ability to quantify and communicate risk. When used correctly, it becomes a powerful weapon in our overall digital resilience lifecycle.
Blog
•Aug 18, 2025

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

What would happen if your business suffered a major cyber attack today? Most organizations aren't ready. But yours can be. In this powerful discussion, WWT cybersecurity experts Kate Kuehn and Angela Brandt reveal how businesses can stay operational through inevitable cyber incidents. Learn why AI-driven threats, internal mistakes, and system malfunctions are reshaping security strategies and how you can build a resilient business that doesn't just survive, but thrives in the face of disruption.
Video
•1:27
Mar 24, 2025

Cybersecurity Program Assessment

WWT is a global leader for the majority of F100 and government organizations, providing audit, compliance and risk management readiness assessments. Specific business units or an entire organization may be evaluated within an assessment to identify findings, gaps and a risk management roadmap. WWT provides a level of detailed analysis to create roadmaps to increase security program maturity and maximize the use of people, processes and technology to reduce risk while increasing efficiencies. <br/><br/> Organizations have different requirements, to both meet compliance and desired areas of risk management focus. For example, US DoD contractors and supporting organizations are required to be CMMC compliant, thus requiring readiness assessments using the CMMC framework published by the US DoD. Other organizations may desire to use a framework like ISO, to focus more upon business controls and operations. WWT supports a wide range of assessment including but not limited to NIST (a wide variety), ISO, CIS, and CMMC.
Assessment

What's new

AI Won't Save You: Easterly, Joyce and CISOs on the Cybersecurity Reality No One Wants to Hear

At a time when AI feels like oxygen — powering every tool, every conversation, every strategy — security leaders at the forefront are sounding the alarm: it won't fix the fundamentals. In this episode, top voices from government, industry and the next generation of cyber talent share unfiltered perspectives on AI-augmented threats, the velocity of attacks and what it really takes to defend in 2025 and beyond. Interviews include former CISA Director Jen Easterly, former NSA Cybersecurity Director Rob Joyce and a bevy of cyber experts from inside and out of WWT.
Video
•1:10
•Aug 19, 2025

Cyber Insurance: The Impact of Digital Risk, Key Takeaways from Black Hat 2025 and What Lies Ahead…

As we reflect on Black Hat 2025, cyber insurance again was one of the main themes, and the biggest take away, loud and clear is that we, as an industry, need to rethink the role of cyber insurance. It is no longer just a financial product, but rather, a strategic instrument—one that reflects the maturity of our security programs, the resilience of our operations, and our ability to quantify and communicate risk. When used correctly, it becomes a powerful weapon in our overall digital resilience lifecycle.
Blog
•Aug 18, 2025

Partner POV | Modernizing Financial Cybersecurity: From Reactive to Resilient

In the high-stakes world of finance, cybersecurity is paramount. As cyber threats evolve, financial institutions must adopt advanced defenses, comply with stringent regulations, and maintain customer trust.
Partner Contribution
•Aug 14, 2025

Partner POV | When You Can't Prevent the Unpreventable, Your Recovery Strategy Must Start Before an Attack

In a world where cyberattacks are inevitable, Rubrik's Preemptive Recovery Engine shifts the focus from prevention to rapid recovery. By integrating continuous threat analysis and automated recovery, it ensures businesses can swiftly bounce back, safeguarding continuity and trust. Are you prepared to recover faster than your attackers can adapt?
Partner Contribution
•Aug 11, 2025

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

Partner POV | Transforming Recovery Operations: Pure Storage and Commvault's Partnership in Cyber Resilience

Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads.
Partner Contribution
•Jun 27, 2025

Strengthening Operational Resilience Through Effective Prioritization and Recovery Strategies

Financial institutions face an operational resilience crisis due to cyber threats and regulatory demands. WWT offers a framework for prioritizing applications, recovery strategies and insights and integrating cyber threats with operational resilience, guided by global and Canadian regulations.
Blog
•Jun 19, 2025

From Idea to Outcome: How WWT Is Leading the AI Security Conversation at Scale

"Security isn't just the CISO's job anymore. It's an executive priority that touches everything from customer data to global compliance."
News
•Jun 5, 2025

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Beyond the Booth: WWT & Intel at Rocky Mountain Cyberspace Symposium

Discover key insights from the Rocky Mountain Cyber Symposium, where Keith Linenberger from WWT and Jason Dunn-Potter from Intel address pressing cyber threats to the Department of Defense and the innovative solutions being developed. This session highlights the collaboration between WWT and Intel, focusing on AI-driven security, advanced tactical edge computing and resilient cybersecurity systems.
Video
•14:05
•Apr 1, 2025

The Future of Cyber Resilience and Risk Management: Tackling AI and Business Continuity

What would happen if your business suffered a major cyber attack today? Most organizations aren't ready. But yours can be. In this powerful discussion, WWT cybersecurity experts Kate Kuehn and Angela Brandt reveal how businesses can stay operational through inevitable cyber incidents. Learn why AI-driven threats, internal mistakes, and system malfunctions are reshaping security strategies and how you can build a resilient business that doesn't just survive, but thrives in the face of disruption.
Video
•1:27
•Mar 24, 2025

Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
•Mar 20, 2025 • 11am

Partner POV | Microsoft 365 Ransomware: Your Comprehensive Guide to Understanding, Prevention, and Recovery

Get a complete understanding for Microsoft 365 ransomware. Learn how M365 attacks occur, preventative measures, and steps to take for prevention and recovery.
Partner Contribution
•Mar 19, 2025

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

Partner POV | DORA is Live. Are Financial Services Companies Ready to Prove Their Resilience?

Crucial legislation brings a new level of rigor and accountability in the EU
Partner Contribution
•Mar 7, 2025

Hour of Cyber: Cyber Resilience

As cyber threats grow more sophisticated, maintaining operational integrity is crucial. Cyber resilience goes beyond prevention, focusing on the ability to anticipate, withstand, recover and adapt to cyber disruptions. A key aspect of this resilience is robust data protection, ensuring the confidentiality, integrity and availability of sensitive information. Effective data protection helps prevent unauthorized access, loss or tampering, enabling quick recovery while preserving trust and compliance. Achieving true resilience requires a holistic approach, with data protection as a core component to ensure mission-critical operations continue seamlessly.
Briefing

Think Beyond Disaster: Driving Cyber Recovery in the Data Center

As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery. Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Video
•2:23
•Mar 3, 2025

Partner POV | Cyber Threat Landscape Q&A with Trellix Head of Threat Intelligence John Fokker

In 2024, the cyber landscape shifted with more law enforcement actions, smaller ransomware groups, GenAI-driven misinformation, and rising hacktivism, leading to increased threats like data-targeting ransomware and disruption-driven attacks.
Partner Contribution
•Feb 19, 2025

Digital Disasters: How Does Cyber Resilience Differ from Conventional Disaster Recovery?

Learn the key distinctions between conventional disaster recovery (DR) frameworks and the specialized tactics required for cyber resilience (CR), particularly when faced with ransomware.
Article
•Feb 4, 2025

Partner POV | Understanding and Leveraging the Role of Platformization in AI-First Cybersecurity

The convergence of cybersecurity and AI is reshaping defenses and attacks alike. Platformization, integrating multiple tools into a unified system, offers a solution to manage complexity and enhance security. Palo Alto Networks' Precision AI exemplifies this approach, providing robust, automated, and contextually aware cybersecurity solutions for modern threats.
Partner Contribution
•Feb 4, 2025

Cyber Resilience

Cyber resilience is the ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises of cyber resources.

389 Followers

At a glance

112Total
40Articles
27Blogs
25Videos
10Events
3Case Studies
2Workshops
2WWT Research
1Briefing
1Lab
1Learning Path
What's related
  • Security
  • Data Center
  • Data Protection & Cyber Recovery
  • Cybersecurity Risk & Strategy
  • WWT Presents
  • Blog
  • Security Operations
  • AI Security
  • AI & Data
  • Commvault
  • Rubrik
  • Cloud
  • Healthcare
  • Applied AI
  • Financial Services
  • Cohesity
  • Fortinet
  • Primary Storage
  • Public Sector
  • WWT Presents Partner Spotlight

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies