Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Deepfakes for Good? How AI is Powering the Next Era of Personalization

Can deepfakes go from dangerous to delightful? In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences. You'll learn: what deepfakes really are and why they're no longer just a security threat; how AI-powered personalization is reshaping the customer experience; and the ethical and technical challenges of using AI-generated content responsibly.
Video
•1:07
•Apr 29, 2025

Cyera Foundations Lab

This Cyera Foundation Lab offers a hands-on experience with Cyera's data security platform, guiding users through real-world use cases like locating PCI data, identifying GDPR violations, and discovering exposed credentials. Learners will explore how Cyera enables continuous data discovery, classification, and risk-based insights across cloud environments.
Foundations Lab
59 launches

Partner POV | 3 Key Predictions for DSPM in 2025: The Future of Cloud Data Security

In 2025, the landscape of cloud data security will be incredibly dynamic and critical. As businesses increasingly migrate data to the public cloud, the need for robust, forward-thinking data security has never been more urgent. This shift will be driven by a myriad of factors, from the proliferation of stringent data regulations to the rise of sophisticated, AI-powered, cloud-driven data breaches. Given these factors, organizations will need to adopt proactive strategies such as data security with zero trust frameworks and AI-powered data security posture management (DSPM) to stay ahead of evolving threats.
Partner Contribution
•Apr 4, 2025

Deepfake Deception: Can You Trust What You See and Hear?

Deepfakes are getting smarter — is your security strategy keeping up? On this episode of The AI Proving Ground Podcast, cybersecurity veterans Kent Noyes and Chris Roberts expose the latest deepfake tactics used by cybercriminals, discuss real-world attacks that have cost companies millions, and share strategies for staying ahead of this AI-driven threat. They'll also unpack the regulatory landscape and the broader geopolitical stakes at play.
Video
•1:46
Feb 11, 2025

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

What's new

Partner POV | The Importance of How Data is Scanned

Data discovery and classification are the foundations for DSPM and data security, but how your data is scanned is more important than you may think.
Partner Contribution
•May 10, 2025

Partner POV | Varonis Named a Leader and Customer Favorite in The Forrester Wave™

Varonis was evaluated in The Forrester Wave™ and received high scores across its Current Offering and Strategy, including several 5/5 ratings.
Partner Contribution
•May 9, 2025

Partner POV | Don't Choose Between DSPM and DLP: Here's Why You Need Both

DSPM and DLP are essential, complementary tools that together secure data across its full lifecycle—DSPM identifies and assesses risk in data at rest, while DLP enforces real-time protection in motion. Integrated, they deliver stronger security, compliance, and threat response.
Partner Contribution
•Apr 30, 2025

Deepfakes for Good? How AI is Powering the Next Era of Personalization

Can deepfakes go from dangerous to delightful? In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences. You'll learn: what deepfakes really are and why they're no longer just a security threat; how AI-powered personalization is reshaping the customer experience; and the ethical and technical challenges of using AI-generated content responsibly.
Video
•1:07
•Apr 29, 2025

Cyera Foundations Lab

This Cyera Foundation Lab offers a hands-on experience with Cyera's data security platform, guiding users through real-world use cases like locating PCI data, identifying GDPR violations, and discovering exposed credentials. Learners will explore how Cyera enables continuous data discovery, classification, and risk-based insights across cloud environments.
Foundations Lab
•59 launches

Partner POV | AI-Driven Threat Detection: Revolutionizing Cyber Defense

Cyberthreats have evolved at an unprecedented pace, growing in both complexity and scale. Ransomware, phishing campaigns, and supply chain attacks have become more sophisticated, making traditional security measures feel sluggish and outdated. In today's digital landscape, where businesses operate across hybrid environments, real-time threat detection is no longer a luxury—it's a necessity.
Partner Contribution
•Apr 17, 2025

Partner POV | GenAI Readiness with BigID for Data, AI Security, & Compliance

BigID's unified platform supports future-proofing data security, enabling organizations to scale AI initiatives confidently.
Partner Contribution
•Apr 8, 2025

Partner POV | Rethinking Data Risk in the AI Era

Modern data risk is complex, with data spread across various environments and formats, creating visibility, siloed solutions, AI risks, and regulatory challenges. A unified, AI-powered approach is essential, integrating security, compliance, and AI governance.
Partner Contribution
•Apr 8, 2025

Partner POV | 3 Key Predictions for DSPM in 2025: The Future of Cloud Data Security

In 2025, the landscape of cloud data security will be incredibly dynamic and critical. As businesses increasingly migrate data to the public cloud, the need for robust, forward-thinking data security has never been more urgent. This shift will be driven by a myriad of factors, from the proliferation of stringent data regulations to the rise of sophisticated, AI-powered, cloud-driven data breaches. Given these factors, organizations will need to adopt proactive strategies such as data security with zero trust frameworks and AI-powered data security posture management (DSPM) to stay ahead of evolving threats.
Partner Contribution
•Apr 4, 2025

Partner POV | Future-Proof Your Data

Discover how Thales' quantum-safe encryption solutions future-proof your data security, protecting sensitive information against the evolving threats of quantum computing.
Video
•0:47
•Apr 1, 2025

Partner POV | PCI DSS Compliance Checklist and Guide

Explore the essential steps and requirements for achieving PCI DSS compliance, crucial for safeguarding sensitive credit card data.
Partner Contribution
•Apr 1, 2025

Partner POV | Data Security Platform

Gartner offers valuable insights into data security platforms help businesses protect sensitive data, stay compliant, and manage security risks, while evaluating vendors based on performance and future potential.
Video
•0:15
•Mar 26, 2025

Identity and Access Management

This Identity and Access Management (IAM) Learning Path provides a structured journey through the essentials of securing organizational resources and data. You'll begin with foundational IAM concepts—covering authentication, authorization, and the principle of least privilege. You will then progress to more advanced topics like Multi-Factor Authentication (MFA), Single Sign-On (SSO) & Privileged Access Management (PAM). By the end, you'll have a solid grasp of the over-all IAM framework & design principles.
Learning Path

Partner POV | DSPM and The AI Shared Responsibility Model

Data Security Posture Management (DSPM) plays a pivotal role in enhancing data governance for generative AI by addressing critical challenges such as data visibility, security, and compliance.
Partner Contribution
•Mar 3, 2025

Data Security Use Cases and Emerging Trends

This learning path provides an exploration of data security strategies, real-world use cases, and emerging trends shaping the future of cybersecurity. This learning path covers foundational principles, advanced threat landscapes, and evolving data protection technologies.
Learning Path

Deepfake Deception: Can You Trust What You See and Hear?

Deepfakes are getting smarter — is your security strategy keeping up? On this episode of The AI Proving Ground Podcast, cybersecurity veterans Kent Noyes and Chris Roberts expose the latest deepfake tactics used by cybercriminals, discuss real-world attacks that have cost companies millions, and share strategies for staying ahead of this AI-driven threat. They'll also unpack the regulatory landscape and the broader geopolitical stakes at play.
Video
•1:46
•Feb 11, 2025

Deep Instinct Data Security X (DSX) for NAS

Deep Instinct provides several solutions powered by deep learning to quickly identify potential attacks. This lab will demonstrate the capabilities of their DSX for NAS - NetApp solution, which can scan files in milliseconds anytime they enter the network or are edited. Files are scanned within the network environment, ensuring full data privacy, confidentiality, and compliance. Files that are found to be malicious can be either deleted or quarantined. Deep Instinct works with both network attached storages and cloud storages.
Foundations Lab
•43 launches

Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer

This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025

The Case for Cybersecurity Platforms: Simplify, Integrate and Conquer

This third article in the 5-part series makes the case for cybersecurity platforms. It explores how platforms provide integrated, scalable protection, simplify management and deliver long-term cost efficiency. By unifying tools and reducing complexity, platforms offer businesses a streamlined, future-ready approach to cybersecurity without sacrificing quality or security efficacy.
Blog
•Dec 19, 2024

In Defense of Point Solutions: Why Specialized Cybersecurity Tools Shine

This second article in the 5-part series highlights the advantages of point solutions. It explains how these specialized tools deliver best-in-class protection, adapt quickly to specific challenges and provide focused ROI. Despite potential complexity, point solutions excel at addressing targeted security needs, making them a smart choice for businesses seeking precision and flexibility.
Blog
•Dec 16, 2024

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

4 Followers

At a glance

48Total
18Articles
16Blogs
5Videos
4Learning Paths
2Labs
2WWT Research
1Briefing
What's related
  • Security
  • AI & Data
  • Cloud
  • AI Security
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Blog
  • Endpoint Security
  • Data Center
  • Data Protection & Cyber Recovery
  • Network Security
  • Security Operations
  • ATC
  • OT Security
  • Data Strategy and Architecture
  • AI Solutions
  • Application & API Security
  • Cyber Range
  • Varonis
  • AI Proving Ground

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies