Overview
Explore
Services
Experts
Events
Select a tab
74 results found
For Better or For Breach: RSA 2025's Commitment to Cyber Unity
The month of May marks the kickoff of both wedding and conference season, a time when people come together to share journeys and celebrate new beginnings. The RSA Conference 2025 exemplified this spirit, bringing together a diverse array of cybersecurity professionals, innovators and thought leaders to tackle ever-evolving threats. Drawing inspiration from the wedding adage "Something Old, Something New, Something Borrowed, Something Blue," we will explore the key themes and insights from this year's event.
Blog
•May 6, 2025
A study in flexible innovation, and forming a new partnership based on trust.
The Filigran partnership enables our teams to provide new ways to enable a more holistic advanced persistent threat (APT) search and remediation methodology based on the combination of breach and attack simulation functions, while taking advantage of native integrations coupled with industry-standard, widely deployed agent technologies.
Blog
•Jul 17, 2025
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023
From Games to Gains: the Role of Game Theory and Gamification in Cybersecurity Risk Management
Game theory and gamification are pivotal in cybersecurity, offering insights into attacker and defender behaviors and enhancing awareness and training. This beginner's guide will delve into using game theory for predictive analysis and gamification to bolster cybersecurity practices. Ideal for professionals, researchers and students, this post marks the beginning of a multi-part series aimed at solidifying the understanding of game theory and gamification's impact on digital security.
Blog
•Feb 29, 2024
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
•May 6, 2024
Fortinet SD-WAN Success Will Innovate FortiSASE
For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
•Oct 21, 2024
Innovative Regulatory Compliance Solutions for the Banking Industry
Banks must address an increasing volume of compliance directives from regulators. This blog post details WWT's multifaceted approach to mitigating regulatory risks through compliance automation, preventative risk management and continuous monitoring.
Blog
•Mar 25, 2024
Key Takeaways from DISTRIBUTECH 2025
The flagship transmission and distribution event provided insight into how electric utilities can stay ahead of growing energy complexities.
Blog
•Apr 10, 2025
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
Telecoms Security Act compliance: The challenges for service providers in 2024
Now that we've passed the first milestone for measures to be implemented, many service providers are progressing towards full TSA compliance – but are you on track to meet the 2028 deadline for completion?
Blog
•Jun 30, 2024
Now is the Time to be Cyber Resilient
Even with the best cybersecurity tools available, there are no guarantees. With a proper cyber resilience strategy, you can bounce back safely, quickly and reliably should a hostile or disruptive attack occur. Here are some key considerations for maintaining a cyber resilient enterprise.
Blog
•May 16, 2022