Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

53 results found

Why Voice Security Can't Stay on Hold Any Longer

From deepfakes to vishing, voice attacks are evolving fast. Here's how technical teams can build stronger defenses.
Article
•Nov 6, 2025

Secure All Together: 5 Principles for Building a Culture of Cybersecurity

Cyber adversaries are becoming more skilled — and more ruthless. Protecting your organization requires a team approach within organizations, with the broad partner ecosystem and across all industries.
Article
•Apr 30, 2025

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Partner POV | AI Provides an Rx for Cybersecurity in Healthcare

Learn from Palo Alto Networks experts about the importance of a balanced approach that combines AI capabilities with human expertise and oversight for effective healthcare cybersecurity.
Partner Contribution
•Aug 30, 2024

Partner POV | New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks

Generative AI's integration into businesses is threatened by prompt attacks, which exploit vulnerabilities in AI models. Palo Alto Networks' report offers a taxonomy of these attacks, highlighting risks and solutions. Understanding and mitigating these threats is crucial for secure GenAI deployment, ensuring innovation thrives in a protected environment.
Partner Contribution
•Jun 11, 2025

Partner POV | Think You Have Visibility? Think Again.

Traditional SIEMs struggle with visibility, leaving gaps for attackers. Cortex XSIAM leverages rich telemetry and data stitching to provide comprehensive threat detection and response. By unifying endpoint, network, and cloud data, it reduces alert fatigue and enhances security operations, enabling proactive defense against sophisticated threats. Discover transformative security with Cortex.
Partner Contribution
•Mar 5, 2026

Partner POV | Understanding and Leveraging the Role of Platformization in AI-First Cybersecurity

The convergence of cybersecurity and AI is reshaping defenses and attacks alike. Platformization, integrating multiple tools into a unified system, offers a solution to manage complexity and enhance security. Palo Alto Networks' Precision AI exemplifies this approach, providing robust, automated, and contextually aware cybersecurity solutions for modern threats.
Partner Contribution
•Feb 4, 2025

Partner POV | Cybersecurity Platformization

Learn how Platformization from Palo Alto Networks can help simplify and modernize your security approach.
Partner Contribution
•May 21, 2024

Partner POV | CrowdStrike Drives Cybersecurity Forward with New Innovations

Explore CrowdStrike's new product capabilities built to fortify organizations' defenses with comprehensive protection across key layers of their environment.
Partner Contribution
•Sep 26, 2024

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Partner POV | Fortinet Expands GenAI Offerings for Security and Networking Operations

Fortinet has expanded its GenAI assistant capabilities for FortiAI, providing better-informed decisions and faster threat response. FortiAnalyzer, FortiSIEM, and FortiSOAR solutions will be enhanced with features such as automatic detection rules, event handlers, and targeted remediation actions. FortiAI will also provide natural language commands to simplify complex investigation queries and build visualizations and reports.
Article
•Sep 13, 2024

Partner POV | Why AI Demands a New Security Playbook

AI is revolutionizing convenience but also reshaping security risks. Traditional defenses falter against AI-driven threats like prompt injection, data poisoning, and sensitive data leaks. A comprehensive, adaptive security approach is essential. Partnering with experts like Akamai ensures robust protection, safeguarding data and business integrity in an evolving threat landscape.
Partner Contribution
•Nov 3, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1131 Followers

At a glance

216Total
86Blogs
53Articles
26Videos
15Events
13Case Studies
9Labs
8Learning Paths
3Workshops
2Communities
1Briefing
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Network Security
  • Cyber Resilience
  • ATC
  • AI & Data
  • Cloud
  • WWT Presents
  • Cloud Security
  • Data Security
  • What we do
  • Zero Trust
  • Consulting Services
  • Fortinet
  • Public Sector
  • Cyber Range
  • Endpoint Security
  • Cisco

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies