Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

What's popular

Secure All Together: 5 Principles for Building a Culture of Cybersecurity

Cyber adversaries are becoming more skilled — and more ruthless. Protecting your organization requires a team approach within organizations, with the broad partner ecosystem and across all industries.
Article
•Apr 30, 2025

Former NSA Cyber Director on the Emerging AI Threat Landscape

AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
Jan 13, 2026

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025
cybersecurity

Cyber experts pinpoint what to look out for in 2026

Expect significant innovations in AI-driven cyber tools and a closer convergence between cybersecurity and geopolitics, they said.
News
•Dec 30, 2025

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

What's new

Former NSA Cyber Director on the Emerging AI Threat Landscape

AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026

Cisco Secure Firewall Sandbox 7.6

Cisco Secure Firewall/Firepower Management NGFW Sandbox lab is a capability of the Advanced Technology Center (ATC). This is designed to provide an environment to gain hands-on experience with the Cisco Secure Firewall version 7.6. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•54 launches

Cisco NGFW Foundation Lab

Cisco NGFW Foundation Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Cisco Secure Firewall solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•898 launches

Partner POV | How CISOs Should Plan Security Budgets for 2026

As cybersecurity budgets rise, confidence lags. The 2026 CISO Budget Benchmark Report reveals strategies to maximize ROI by focusing on security yield, optimizing workforce models, simplifying cloud complexity, and rationalizing tools. Success hinges on quantifying risk reduction, reinvesting efficiencies, and strategically leveraging AI, setting a new standard for cybersecurity investment.
Partner Contribution
•Jan 9, 2026

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Partner POV | The Year in Review 2025: AI, APIs, and a Whole Lot of Audacity

In 2025, AI-driven cyberattacks surged, challenging traditional defenses and highlighting the need for robust cybersecurity strategies. As threats evolve, organizations must prioritize AI literacy, API security, and resilience against sophisticated attacks. Looking to 2026, the focus shifts to managing AI risks, understanding attacker motivations, and enhancing cross-team communication for effective incident response.
Partner Contribution
•Jan 5, 2026

Infrastructure as a Strategic Target of War

As infrastructure disruption becomes an acknowledged tool of state power, resilience is no longer just a cyber issue — it's operational and strategic. This piece outlines what critical infrastructure operators, boards and technology providers must reassess in a world where disruption is deliberate.
Blog
•Jan 4, 2026
cybersecurity

Cyber experts pinpoint what to look out for in 2026

Expect significant innovations in AI-driven cyber tools and a closer convergence between cybersecurity and geopolitics, they said.
News
•Dec 30, 2025
Wash DC

Zero Trust Helps Federal Agencies Move Software to Production Faster Share

IT officials, including WWT's Ramon Thomas, said zero trust supports rapid deployment, inventory visibility and stronger cybersecurity across IT and OT systems.
News
•Dec 18, 2025

The New Threat Vector: Narrative Attacks on Global Organizations and Their Executives

A joint WWT and Blackbird.AI webinar explained why perception-focused narrative attacks now sit alongside ransomware and data breaches and how narrative intelligence helps leaders see and manage this new risk surface.
News
•Dec 11, 2025

Check Point Targets Enterprise Ai cybersecurity And Zero Trust With Quantum Firewall Release

Check Point Software Technologies has rolled out a major update to its Quantum Firewall Software, introducing 20 new features aimed at helping enterprises secure Ai transformations, implement Zero Trust strategies and unify hybrid mesh network protection.
News
•Dec 9, 2025

Partner POV | 7 Cybersecurity Predictions for 2026 from Forescout Research + Vedere Labs

Cybersecurity is evolving, with attackers exploiting SaaS app permissions, offering Social-Engineering-as-a-Service, and targeting supply chains. Quantum readiness and edge device vulnerabilities are rising concerns. Cybercrime is fragmenting into specialists using shared tools, while hacktivists weaponize confusion. Prepare defenses by understanding these trends and enhancing visibility and threat detection.
Partner Contribution
•Dec 2, 2025

Partner POV | AI Security: Defining and Defending Cybersecurity's Next Frontier

AI is revolutionizing business and security, offering both innovation and risk. As AI accelerates operations and threats, SentinelOne's AI-native solutions provide real-time, autonomous protection. By integrating AI for security and security for AI, we ensure a safer digital future, empowering human potential and preserving digital integrity.
Partner Contribution
•Dec 1, 2025

Partner POV | Special Report on Ransomware Trends

Experts at Forescout discuss recent trends in ransomware, including the U.K. government's policies banning public sectors from paying cyber ransoms. The VP of Security Intelligence, Rik Ferguson, is interviewed by Alison King, VP of Government Affairs.
Video
•6:03
•Dec 1, 2025

WWT and Tanium at Converge 2025: Autonomous IT & Unstoppable Partnership

At Tanium Converge 2025, WWT showcased its strategic partnership with Tanium, emphasizing real-time, AI-driven risk management. Key innovations like Tanium Ask and Jump Gate highlight a shift towards Autonomous IT, enhancing operational efficiency and security. Together, WWT and Tanium empower organizations to transition from reactive to proactive IT management.
Blog
•Nov 24, 2025

Service Chain Management Process With F5 SSLO

The intended goal of this lab is to enable security administrators to configure and test F5 SSL Orchestrator and showcase how to dynamically orchestrate security infrastructure.
Advanced Configuration Lab
•148 launches

Zero Trust Principles

Not just a single solution, a zero trust implementation is an integrated approach for continuous validation of authorized users across your entire organization. A zero trust security framework focuses on protecting critical assets through a layered, continuously monitored and adaptable architecture that minimizes risks and containment in case of breaches.
Blog
•Nov 18, 2025

Partner POV | Agentic AI and Cybersecurity: Threats and Opportunities

Agentic AI, a double-edged sword in cybersecurity, autonomously adapts and learns, creating both formidable defenses and sophisticated threats. As it revolutionizes threat detection and response, it also poses risks of autonomous malware and AI-driven attacks. Balancing innovation with control is crucial to harness its potential safely.
Partner Contribution
•Nov 17, 2025

Partner POV | The CISO-CIO Imperative: Innovation Secured

In the digital age, the CISO-CIO partnership is crucial for secure innovation and business success. By integrating security into technology strategies, they transform potential friction into resilience, ensuring rapid, secure growth. This unified approach optimizes resources, enhances risk management, and positions organizations to thrive in a competitive landscape.
Partner Contribution
•Nov 12, 2025

Partner POV | What 400 Executives Reveal About the Future of AI Adoption

AI is reshaping enterprise strategies, with 76% of companies using it to enhance customer experience and operational efficiency. As AI becomes a strategic imperative, organizations must balance innovation with risk management, ensuring security, compliance, and transparency. Success hinges on flexible architectures, strategic partnerships, and a focus on customer value.
Partner Contribution
•Nov 10, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1123 Followers

At a glance

203Total
80Blogs
47Articles
24Videos
16Events
13Case Studies
9Labs
7Learning Paths
3Workshops
2Communities
1Briefing
1WWT Research
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Cyber Resilience
  • Network Security
  • WWT Presents
  • AI & Data
  • ATC
  • Cloud
  • What we do
  • Cloud Security
  • Data Security
  • Consulting Services
  • Public Sector
  • Zero Trust
  • Endpoint Security
  • Applied AI
  • Cyber Range
  • Cisco

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies