Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

What's popular

AI for Security vs Security for AI with Palo Alto Networks

Join WWT and Palo Alto Networks for an insightful discussion about how AI is transforming organizations and reshaping today's cybersecurity landscape. Learn how Palo Alto Networks comprehensive platform approach combined with WWT's ARMOR framework and ATC validation capabilities, helps customers secure every aspect of AI usage from development to deployment and beyond.
Webinar
•Feb 26, 2026 • 9am

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Hour of Cyber

Hour of Cyber is a private thought-leadership series for security leaders to connect with WWT experts and executive advisors
Public Community

Secure All Together: 5 Principles for Building a Culture of Cybersecurity

Cyber adversaries are becoming more skilled — and more ruthless. Protecting your organization requires a team approach within organizations, with the broad partner ecosystem and across all industries.
Article
•Apr 30, 2025

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

What's new

Partner POV | Think You Have Visibility? Think Again.

Traditional SIEMs struggle with visibility, leaving gaps for attackers. Cortex XSIAM leverages rich telemetry and data stitching to provide comprehensive threat detection and response. By unifying endpoint, network, and cloud data, it reduces alert fatigue and enhances security operations, enabling proactive defense against sophisticated threats. Discover transformative security with Cortex.
Partner Contribution
•Mar 5, 2026

Zscaler UVM & Risk360 - Powered by the Zscaler AI Data Security Fabric

Zscaler, the leader in cloud security, acquired Avalor in 2024 bringing it's Data Fabric for Security technology to it's already robust tool sets giving their users a comprehensive vulnerability management and remediation platform. In this lab you will learn the basics of the Unified Vulnerability Management module (UVM) giving you a baseline understanding of how to prioritizer your vulnerabilities, improve asset hygiene by identifying coverage and gaps, deduplicating findings, and streamlining remediations (getting it to the right teams). We'll also explore quantifying your cyber risks using Zscaler Risk360 module. Now let's get started!
Foundations Lab
•123 launches

AI for Security vs Security for AI with Palo Alto Networks

Join WWT and Palo Alto Networks for an insightful discussion about how AI is transforming organizations and reshaping today's cybersecurity landscape. Learn how Palo Alto Networks comprehensive platform approach combined with WWT's ARMOR framework and ATC validation capabilities, helps customers secure every aspect of AI usage from development to deployment and beyond.
Webinar
•Feb 26, 2026 • 9am

Partner POV | Insights for 2026 from Forescout CEO, Barry Mainz

In 2026, Forescout and partners will tackle accelerated AI-driven threats with Universal Zero Trust Network Access, transforming defense strategies. By embedding operational AI, enhancing visibility, and ensuring quantum readiness, they aim to shift from reactive to proactive security, empowering partners to secure faster and adapt to evolving challenges in a complex digital landscape.
Partner Contribution
•Feb 23, 2026

Stop Stacking Boxes. Start Designing Security.

Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026

Partner POV | Trellix and Nozomi Networks: Charting the Future of IT/OT Security

The convergence of IT and OT security is essential as digital and physical worlds merge. The Trellix and Nozomi Networks integration offers a unified approach, enhancing asset visibility and threat detection. This partnership provides a blueprint for resilient, proactive defense, crucial for safeguarding critical infrastructure and ensuring safety in an interconnected future.
Partner Contribution
•Feb 17, 2026

Cyber Resilience: Why Security Fails When It Matters Most

Your organization didn't avoid a cyberattack — it endured one. That distinction matters more than most leaders realize. In this WWT Presents Research episode, we push back on the outdated idea that cybersecurity is about keeping attackers out. Instead, cyber resilience assumes compromise and focuses on what must keep running when defenses fail. Host Robb Boyd is joined by Madison Horn, WWT's National Security and Infrastructure Advisor, and Rob Joyce, former NSA Cybersecurity Director, to unpack why many organizations recover once — but struggle to recover again.
Video
•1:04
•Feb 16, 2026

OPSWAT Recognizes Its 2025 Channel Partners of the Year with Distinguished Awards

Partners have been instrumental in helping customers protect and secure their operations, address the growing demand for advanced cybersecurity solutions, and deliver impact on a global scale.
News
•Feb 13, 2026

Partner POV | The Visibility Gap Undermining OT and IOT Security

Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026

Enterprise Browsers as the New Workplace Experience

The shift from traditional, natively installed applications to web-based SaaS productivity tools has been highlighted by the increasing reliance on browsers as the new workspace. WWT's Andrew Ridner discusses the security limitations of consumer browsers and the introduction of enterprise browsers as purpose-built solutions offering enhanced security, governance and data protection features. Andrew also reviews use cases for enterprise browsers, including security and compliance, and remote and hybrid work. Finally, Andrew reviews improved user experience in banking, healthcare, IT, government and manufacturing sectors.
Video
•6:49
•Feb 9, 2026

Milan 2026: Securing the Upcoming Winter Games in an Age of Hyper-Connectivity and AI-Driven Chaos

The expanding digital ecosystem of the Winter Games demands identity-first, AI-aware security heading into Milan 2026.
Blog
•Feb 5, 2026

From AI-Powered Attacks to Sovereign AI Security: Strategic Insights from WWT and Fortinet

Join WWT and Fortinet for an expert‑led discussion on how AI is reshaping today's cybersecurity landscape. Hear leaders from both organizations break down the rising speed, scale, and sophistication of AI‑powered cyberattacks, and the parallel challenges organizations face—complexity, skills shortages and expanding attack surfaces. Learn how Fortinet's long‑standing AI and ML innovation, combined with WWT's ARMOR framework and ATC validation capabilities, helps customers secure modern AI environments, simplify SOC/NOC operations, and build resilient, sovereign AI infrastructure. Discover actionable guidance on adopting AI securely, mitigating risks early, and leveraging existing platform investments to stay ahead in an era of agentic AI and accelerated threat evolution.
Webinar
•Jan 29, 2026 • 9am

Partner POV | Post-Quantum Cryptography: What It Is and How It Works

Quantum computers threaten current encryption, necessitating post-quantum cryptography (PQC) to secure data against future quantum attacks. Organizations must transition to PQC, leveraging algorithms like Kyber and Dilithium, to protect sensitive information. Proactive adoption ensures long-term security, safeguarding data from the impending quantum era.
Partner Contribution
•Jan 29, 2026

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Integrating Dataminr into a Palo Alto Networks–Centric Platform

Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026

Partner POV | Inside CrowdStrike's Science-Backed Approach to Building Expert SOC Agents

AI-enabled adversaries challenge traditional SOCs, necessitating AI agents for effective triage and response. CrowdStrike's Charlotte AI leverages expert data, scientific benchmarking, and continuous feedback to deliver analyst-grade decision-making. This approach transforms SOC operations, enhancing accuracy and efficiency while maintaining human oversight and adaptability against evolving threats.
Partner Contribution
•Jan 20, 2026

Former NSA Cyber Director on the Emerging AI Threat Landscape

AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026

Cisco Secure Firewall Sandbox 7.6

Cisco Secure Firewall/Firepower Management NGFW Sandbox lab is a capability of the Advanced Technology Center (ATC). This is designed to provide an environment to gain hands-on experience with the Cisco Secure Firewall version 7.6. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•66 launches

Cisco NGFW Foundation Lab

Cisco NGFW Foundation Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Cisco Secure Firewall solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•925 launches

Cisco Secure Firewall FTD

In this video Drew Kaiser (WWT Technical Solution Architect) and Nick Carrieri (Cisco SBG's Director of Product Management) take a look at Cisco Firewall Threat Defense and some of the new features available with the latest release.
Video
•9:32
•Jan 13, 2026

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1127 Followers

At a glance

212Total
83Blogs
51Articles
26Videos
16Events
13Case Studies
8Labs
8Learning Paths
3Workshops
2Communities
1Briefing
1WWT Research
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Cyber Resilience
  • Network Security
  • ATC
  • AI & Data
  • WWT Presents
  • Cloud
  • Data Security
  • What we do
  • Cloud Security
  • Zero Trust
  • Consulting Services
  • Public Sector
  • Fortinet
  • Cyber Range
  • Endpoint Security
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies