Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

What's popular

Hour of Cyber

Hour of Cyber is a private thought-leadership series for security leaders to connect with WWT experts and executive advisors
Public Community

Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR

Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
Mar 26, 2026 • 9am

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Secure All Together: 5 Principles for Building a Culture of Cybersecurity

Cyber adversaries are becoming more skilled — and more ruthless. Protecting your organization requires a team approach within organizations, with the broad partner ecosystem and across all industries.
Article
•Apr 30, 2025

Former NSA Cyber Director on the Emerging AI Threat Landscape

AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
Jan 13, 2026

What's new

Partner POV | Proofpoint Insider Threat Management

In a world of distributed workforces, insider threats pose significant risks to organizations. Proofpoint's Insider Threat Management (ITM) offers comprehensive visibility and adaptive, risk-based approaches to detect and mitigate insider risks. By balancing privacy and security, ITM empowers organizations to protect data, reduce incidents, and enhance overall security posture.
Partner Contribution
•Apr 2, 2026

Partner POV | Dataminr for Cyber Defense: What's Coming, What It Costs, and What to Do Next

In 2024, 57% of cyber attacks went undetected by security teams despite using numerous tools. Dataminr's AI-native Cyber Defense unites threat intelligence, operations, and risk management to answer critical questions: What's coming? What does it cost? What do we do next? This integrated approach enhances foresight, focus, and action.
Partner Contribution
•Mar 31, 2026

Securing AI in Motion: Gigamon Deep Observability for WWT ARMOR

Gain insights into Gigamon's role in strengthening AI security through improved network visibility, alongside WWT's AI Readiness Model for Operational Resilience (ARMOR) framework. Kent Noyes (WWT), Bassam Khan (Gigamon), and Istvan Berko (WWT) discuss how rapid AI adoption is expanding the attack surface and why organizations need governance, data controls, and visibility into data flows to innovate securely. The session outlines ARMOR's focus areas (including governance/compliance, model protection, data security operations, and secure development lifecycle) and explains how Gigamon's east-west traffic visibility and metadata extraction can support detection, investigations, and AI-driven analytics for SOC and operational use cases.
Webinar
•Mar 26, 2026 • 9am
datacenter

Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management

Dataminr for Cyber Defense, the first unified solution from the acquisition of ThreatConnect, fuses real-time intelligence with detailed internal posture to contextualize, prioritize, and automate the entire threat management lifecycle.
News
•Mar 23, 2026

Stop Treating Cloud Security Like a Post-Deployment Fire Drill

Cloud environments ship too fast for security reviews that happen after deployment. This post breaks down what DevSecOps and cloud workload security look like when they're actually integrated — security requirements defined before code is written, pipeline gates that enforce rather than just report, and runtime findings that feed back to the team that owns the workload. Security built in, not bolted on.
Blog
•Mar 23, 2026

Beyond the Big Stages: Why Grassroots Cybersecurity Events Matter

Cybersecurity isn't just built at RSA and Black Hat. It happens in local communities, regional events and grassroots conversations—and that's where organizations should be investing more of their time and energy.
Blog
•Mar 19, 2026

Check Point Technologies, Architecture, & Deployment Models

This learning path delivers a structured exploration of Check Point's security design principles and platform deployment models across enterprise network environments. Through guided articles, videos, & a hands-on-lab, participants will develop meaningful insightst around platform selection, deployment placement, and policy design for the data center, Internet edge, campus, and branch.
Learning Path
•Intermediate

Partner POV | The 2026 AI Frontier: Securing the New Enterprise Architecture - A Collaborative Perspective from WWT & Cloudflare

Cloudflare and WWT offer a unified platform to secure AI tools and applications, addressing shadow AI and data exposure. As AI becomes foundational by 2026, organizations must rethink infrastructure and security. Cloudflare's solutions enhance visibility, control, and cost-efficiency, enabling safe, rapid AI innovation. How fast can your enterprise go?
Partner Contribution
•Mar 10, 2026

Is Your Branching Strategy a Security Control or Just a Workflow?

Shift-left security only works if the foundation underneath it is built to enforce it —and that foundation starts with your branching strategy. This post makes the case that branching isn't just a developer workflow decision; it's a security architecture decision. We cover what branch protection actually enforces, how to choose the right model for your team, the three controls to implement this week, and how WWT's Cloud Workload Security practice helps teams build this foundation through hands-on workshops and implementation guidance.
Blog
•Mar 9, 2026

Partner POV | Think You Have Visibility? Think Again.

Traditional SIEMs struggle with visibility, leaving gaps for attackers. Cortex XSIAM leverages rich telemetry and data stitching to provide comprehensive threat detection and response. By unifying endpoint, network, and cloud data, it reduces alert fatigue and enhances security operations, enabling proactive defense against sophisticated threats. Discover transformative security with Cortex.
Partner Contribution
•Mar 5, 2026

Zscaler UVM & Risk360 - Powered by the Zscaler AI Data Security Fabric

Zscaler, the leader in cloud security, acquired Avalor in 2024 bringing it's Data Fabric for Security technology to it's already robust tool sets giving their users a comprehensive vulnerability management and remediation platform. In this lab you will learn the basics of the Unified Vulnerability Management module (UVM) giving you a baseline understanding of how to prioritizer your vulnerabilities, improve asset hygiene by identifying coverage and gaps, deduplicating findings, and streamlining remediations (getting it to the right teams). We'll also explore quantifying your cyber risks using Zscaler Risk360 module. Now let's get started!
Foundations Lab
•Fundamentals
•127 launches

AI for Security vs Security for AI with Palo Alto Networks

Join WWT and Palo Alto Networks for an insightful discussion about how AI is transforming organizations and reshaping today's cybersecurity landscape. Learn how Palo Alto Networks comprehensive platform approach combined with WWT's ARMOR framework and ATC validation capabilities, helps customers secure every aspect of AI usage from development to deployment and beyond.
Webinar
•Feb 26, 2026 • 9am

Partner POV | Insights for 2026 from Forescout CEO, Barry Mainz

In 2026, Forescout and partners will tackle accelerated AI-driven threats with Universal Zero Trust Network Access, transforming defense strategies. By embedding operational AI, enhancing visibility, and ensuring quantum readiness, they aim to shift from reactive to proactive security, empowering partners to secure faster and adapt to evolving challenges in a complex digital landscape.
Partner Contribution
•Feb 23, 2026

Partner POV | G7 Sets Quantum Deadline: Roadmap Signals Industry Urgency for All

Quantum computing is here, sparking a race for post-quantum cryptography (PQC) readiness. The G7 roadmap outlines a 2030-2035 migration window, urging organizations to strategize now. Forescout's technology aids in detecting and managing PQC vulnerabilities. Act now to secure your future against this looming threat. The countdown to Q-Day has begun.
Partner Contribution
•Feb 23, 2026

Cisco NGFW Intermediate Lab Version 10

Cisco NGFW Intermediate Lab is a capability of the Advanced Technology Center designed to provide an environment to increase your technical knowledge of the Cisco Secure Firewall portfolio. The environment that supports the lab is completely virutal, removing any hardware dependencies assoicated with physical infrastructure.
Advanced Configuration Lab
•Intermediate
•22 launches

Stop Stacking Boxes. Start Designing Security.

Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026

Partner POV | Trellix and Nozomi Networks: Charting the Future of IT/OT Security

The convergence of IT and OT security is essential as digital and physical worlds merge. The Trellix and Nozomi Networks integration offers a unified approach, enhancing asset visibility and threat detection. This partnership provides a blueprint for resilient, proactive defense, crucial for safeguarding critical infrastructure and ensuring safety in an interconnected future.
Partner Contribution
•Feb 17, 2026

Cyber Resilience: Why Security Fails When It Matters Most

Your organization didn't avoid a cyberattack — it endured one. That distinction matters more than most leaders realize. In this WWT Presents Research episode, we push back on the outdated idea that cybersecurity is about keeping attackers out. Instead, cyber resilience assumes compromise and focuses on what must keep running when defenses fail. Host Robb Boyd is joined by Madison Horn, WWT's National Security and Infrastructure Advisor, and Rob Joyce, former NSA Cybersecurity Director, to unpack why many organizations recover once — but struggle to recover again.
Video
•1:04
•Feb 16, 2026

OPSWAT Recognizes Its 2025 Channel Partners of the Year with Distinguished Awards

Partners have been instrumental in helping customers protect and secure their operations, address the growing demand for advanced cybersecurity solutions, and deliver impact on a global scale.
News
•Feb 13, 2026

Partner POV | The Visibility Gap Undermining OT and IOT Security

Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1131 Followers

At a glance

216Total
86Blogs
53Articles
26Videos
15Events
13Case Studies
9Labs
8Learning Paths
3Workshops
2Communities
1Briefing
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Network Security
  • Cyber Resilience
  • ATC
  • AI & Data
  • Cloud
  • WWT Presents
  • Cloud Security
  • Data Security
  • What we do
  • Zero Trust
  • Consulting Services
  • Fortinet
  • Public Sector
  • Cyber Range
  • Endpoint Security
  • Cisco

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies