Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

48 results found

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Partner POV | Secure-by-Design: Microsoft and Rubrik's Engineered Cyber Resilience Architecture

Cyber resilience transcends mere products, demanding architectural foresight and integration. Microsoft and Rubrik exemplify this through a "Secure-By-Design" approach, ensuring robust identity management, data sovereignty, and recovery workflows within Azure. This partnership fortifies organizations against disruptions, embedding resilience as an inherent architectural outcome, not an afterthought.
Partner Contribution
•Apr 20, 2026

F5 Distributed Cloud SaaS: WAAP (Web App and API Protection)

Explore the Web App & API Protection (WAAP) capabilities of F5 Distributed Cloud platform.
Article
•Aug 16, 2024

Partner POV | 3 Ways to Leverage AI to Improve Your Data Security Posture

AI is often seen as a solution to cybersecurity challenges, but its effectiveness depends on proper implementation and management.
Partner Contribution
•Aug 26, 2024

Cohesity Gaia Brings GenAI to Backup Data—Securely

Cohesity Gaia enables organizations to make smarter and faster decisions securely and responsibly by bringing the power of retrieval-augmented generation (RAG) AI and large language modeling (LLM) to your backup enterprise data within Cohesity.
Article
•Dec 13, 2024

Partner POV | Visualize your datasets with Cohesity Gaia

Use enhanced Gen AI capabilities to gain insights from your corporate data.
Partner Contribution
•Nov 6, 2024

Partner POV | Elevating Cyber Resilience in a Cloud-First World

Discover how Commvault's latest innovations, unveiled at the 2024 SHIFT event, are set to revolutionize the future of data protection.
Partner Contribution
•Nov 13, 2024

Partner POV | Unlocking the future of data security with Cohesity's responsible AI

Harness the full potential of AI while ensuring its ethical and responsible use.
Partner Contribution
•Aug 5, 2024

Partner Overview | Satori Named Leader in GigaOm's Data Access Governance Radar Report

Why governing data usage has become a security imperative.
Partner Contribution
•Apr 28, 2026

Partner POV | A guide for AI-powered data security: How to deliver breakthrough outcomes

Turbocharge your enterprise with speed, security, scale, simplicity, and smarts from the Cohesity Data Cloud.
Partner Contribution
•Nov 8, 2024

Partner POV | Modernizing Financial Cybersecurity: From Reactive to Resilient

In the high-stakes world of finance, cybersecurity is paramount. As cyber threats evolve, financial institutions must adopt advanced defenses, comply with stringent regulations, and maintain customer trust.
Partner Contribution
•Aug 14, 2025

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

911 Followers

At a glance

142Total
48Articles
33Blogs
23Videos
11Learning Paths
9Case Studies
9Events
6Labs
2WWT Research
1Briefing
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Cohesity
  • Commvault
  • Blog
  • Rubrik
  • AI & Data
  • Dell Tech
  • Cloud
  • Applied AI
  • Data Security
  • Primary Storage
  • Commvault Cyber Resilience
  • Dell Data Protection
  • Cloud Security
  • Cohesity Data Protection
  • WWT Presents
  • AI Security

What's related

WWT
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies