Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

49 results found

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Secure All Together: 5 Principles for Building a Culture of Cybersecurity

Cyber adversaries are becoming more skilled — and more ruthless. Protecting your organization requires a team approach within organizations, with the broad partner ecosystem and across all industries.
Article
•Apr 30, 2025

Why Voice Security Can't Stay on Hold Any Longer

From deepfakes to vishing, voice attacks are evolving fast. Here's how technical teams can build stronger defenses.
Article
•Nov 6, 2025

Partner POV | Post-Quantum Cryptography: What It Is and How It Works

Quantum computers threaten current encryption, necessitating post-quantum cryptography (PQC) to secure data against future quantum attacks. Organizations must transition to PQC, leveraging algorithms like Kyber and Dilithium, to protect sensitive information. Proactive adoption ensures long-term security, safeguarding data from the impending quantum era.
Partner Contribution
•Jan 29, 2026

Partner POV | Why AI Demands a New Security Playbook

AI is revolutionizing convenience but also reshaping security risks. Traditional defenses falter against AI-driven threats like prompt injection, data poisoning, and sensitive data leaks. A comprehensive, adaptive security approach is essential. Partnering with experts like Akamai ensures robust protection, safeguarding data and business integrity in an evolving threat landscape.
Partner Contribution
•Nov 3, 2025

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Key Trends for Media, Gaming and Entertainment

This article aims to inform, inspire and guide the MEG industry on how to leverage the latest technologies to create immersive experiences, achieve business outcomes and stay ahead of the competition.
Article
•May 9, 2024

Five Considerations for Successful Identity and Access Management Architecture

Discover the five considerations needed to effectively incorporate Identity and Access Management (IAM) into your business.
Article
•Apr 14, 2025

Partner POV | How CISOs Should Plan Security Budgets for 2026

As cybersecurity budgets rise, confidence lags. The 2026 CISO Budget Benchmark Report reveals strategies to maximize ROI by focusing on security yield, optimizing workforce models, simplifying cloud complexity, and rationalizing tools. Success hinges on quantifying risk reduction, reinvesting efficiencies, and strategically leveraging AI, setting a new standard for cybersecurity investment.
Partner Contribution
•Jan 9, 2026

Partner POV | The Visibility Gap Undermining OT and IOT Security

Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026

Wireless Intrusion: Detecting and Preventing Targeted Attacks

Is your Wi-Fi infrastructure vulnerable to an attack threat? Do you know? How would you find out?
Article
•Mar 8, 2024

Partner POV | What 400 Executives Reveal About the Future of AI Adoption

AI is reshaping enterprise strategies, with 76% of companies using it to enhance customer experience and operational efficiency. As AI becomes a strategic imperative, organizations must balance innovation with risk management, ensuring security, compliance, and transparency. Success hinges on flexible architectures, strategic partnerships, and a focus on customer value.
Partner Contribution
•Nov 10, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1127 Followers

At a glance

211Total
83Blogs
49Articles
26Videos
17Events
13Case Studies
8Labs
8Learning Paths
3Workshops
2Communities
1Briefing
1WWT Research
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Cyber Resilience
  • Network Security
  • ATC
  • AI & Data
  • WWT Presents
  • Cloud
  • Data Security
  • What we do
  • Cloud Security
  • Consulting Services
  • Public Sector
  • Zero Trust
  • Fortinet
  • Cyber Range
  • Endpoint Security
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies