Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Secure Cloud: Complete

Uncover segmentation, data, application and API Risks in the cloud with WWT's Secure Cloud: Complete Accelerator powered by Wiz, Cyera and Illumio
Assessment

Why Quantum Computing Threat Will Impact "Absolutely Everyone" In Security: Experts

The fact that the date of "Q-Day" is unknown may ultimately be irrelevant, since post-quantum encryption is on track to become a business and compliance obligation in coming years, experts tell CRN.
News
•Oct 8, 2025

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
Oct 21, 2025

AI Acceleration in Action: How AI in Higher Ed Is Balancing Innovation vs. Risk

AI is transforming higher education — from classrooms to research labs — but with innovation comes risk. How can universities protect sensitive data, meet compliance obligations, and still foster discovery? In this episode of the AI Proving Ground Podcast, WWT Higher Ed Principal Advisor Janet and Principal Cybersecurity Consultant for AI Bryan Fite share how one leading university is tackling AI governance and building guardrails that empower rather than restrict. Their insights reveal why higher ed is a proving ground for responsible AI adoption — and why every industry should be paying attention.
Video
•1:55
Sep 9, 2025

What's new

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025

Data Security Use Cases and Emerging Trends

This learning path covers data security strategies, real-world use cases, and emerging trends shaping the future of data & cyber security. This learning path also covers foundational principles, advanced threat mitigation, & the various data protection technologies.
Learning Path

Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication

Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025

Why Quantum Computing Threat Will Impact "Absolutely Everyone" In Security: Experts

The fact that the date of "Q-Day" is unknown may ultimately be irrelevant, since post-quantum encryption is on track to become a business and compliance obligation in coming years, experts tell CRN.
News
•Oct 8, 2025

Partner POV | Inside the Mind of CISOs: Key Insights from Proofpoint's 2025 Voice of the CISO Report

In 2025, CISOs face escalating cyber threats, data sprawl, and human vulnerabilities, despite strong cybersecurity cultures. The Voice of the CISO report reveals a paradox of confidence and concern, urging a shift towards smarter technology, robust governance, and strategic board engagement to transform organizational confidence into true resilience.
Partner Contribution
•Sep 12, 2025

Partner POV | Varonis Acquires SlashNext, AI-Native Email Security

Varonis acquires SlashNext, integrating its AI-driven phishing detection into their Data Security Platform. This strategic move enhances threat detection from email to data, offering comprehensive protection against sophisticated social engineering attacks. By connecting email, identity, and data, Varonis aims to revolutionize data security and stop breaches before they begin.
Partner Contribution
•Sep 10, 2025

AI Acceleration in Action: How AI in Higher Ed Is Balancing Innovation vs. Risk

AI is transforming higher education — from classrooms to research labs — but with innovation comes risk. How can universities protect sensitive data, meet compliance obligations, and still foster discovery? In this episode of the AI Proving Ground Podcast, WWT Higher Ed Principal Advisor Janet and Principal Cybersecurity Consultant for AI Bryan Fite share how one leading university is tackling AI governance and building guardrails that empower rather than restrict. Their insights reveal why higher ed is a proving ground for responsible AI adoption — and why every industry should be paying attention.
Video
•1:55
•Sep 9, 2025

Scattered Spider and the Insurance Industry

Scattered Spider exploits the insurance industry's vulnerabilities through advanced social engineering, targeting legacy systems and human weaknesses. As cyber threats evolve, insurers must transition from prevention to resilience, focusing on rapid detection and response. The industry's future hinges on integrating technology, processes and human awareness to thwart these sophisticated attacks.
Blog
•Aug 31, 2025

Black Hat Ignites Under Vegas Lights

When asked about advocacy, WWT's Kate Kuehn defined it as helping leaders cut through the noise, balancing opportunity with risk, and moving beyond the myth of a magic pill solution.
News
•Aug 27, 2025

Secure Cloud: Complete - Uncover Risks in the Cloud

Secure Cloud: Complete offers a 21-day analysis of your cloud environment, enhancing visibility and security through integrated tools like Wiz, Cyera and Illumio. This unified accelerator identifies risks, maps data and visualizes traffic, empowering organizations to refine cloud strategies and accelerate digital initiatives without disrupting existing operations.
Blog
•Aug 21, 2025

Varonis Foundations Lab

The purpose of this lab is to help you develop proficiency in navigating and understanding features within the Varonis admin console. In this lab environment, you will gain hands-on experience with essential Varonis and DLP-related tasks with Microsoft 365. You will get hands-on experience with real-world use cases while learning how to navigate different Varonis dashboards.
Foundations Lab
•58 launches

Introduction to Zero Trust

Introduction to Zero Trust provides a foundational understanding of the "never trust, always verify" security model, highlighting its necessity in today's distributed and threat-filled digital landscape. It introduces Microsoft's six-pillar framework for Zero Trust, outlining how their tools align with core principles like "Verify Explicitly," "Least Privilege," and "Assume Breach" across various organizational assets.
Video
•6:30
•Aug 7, 2025

Partner POV | Cybersecurity in Data Centers: The Critical Role of Rack PDUs

In a hyperconnected world, data centers face escalating cyber threats, with rack PDUs as prime targets. Balancing convenience and security is crucial. Implementing AAA frameworks, robust encryption, and third-party certifications can mitigate risks. Collaboration between users and suppliers is essential to safeguard critical infrastructure and prevent costly breaches.
Partner Contribution
•Aug 6, 2025

AI Agents: Scaling Your Digital Workforce

Enterprise adoption of AI agents is spiking, with industry surveys showing most large enterprises are already piloting AI agents. But there's a lot of hype out there. In this episode of the AI Proving Ground Podcast, Technical Solutions Architect Ina Poecher and Jason Campagna, Senior Director of WWT's AI Practice, expose widespread "agent-washing," highlight practical but ROI-heavy use cases you can pursue now. Tune in to discover how agentic architecture turns generative AI hype into secure, measurable enterprise AI outcomes — and what's next for multi-agent ecosystems.
Video
•1:36
•Jul 22, 2025

Still Drowning in Your Data Lake?

Dear CIOs and CTOs, Congratulations! You finally convinced the board to invest millions in your data lake, and after only a decade of work, you've successfully centralized… well… a whole lot of unstructured sludge. That single source of truth you promised? More like a single point of confusion. And now — just as you're ready to sit back and bask in the glory of your petabyte-scale swamp — along comes something called agentic frameworks, and suddenly all that centralized data you've been hoarding seems about as useful as a dial-up modem at a 5G conference. Let's talk about why it's time to reconsider your data strategy.
Blog
•Jul 14, 2025

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

Opinion: How to Balance Learning Analytics With Data Privacy

The capacity of learning analytics platforms to collect troves of student data makes them both institutional necessities and liabilities. A handful of best practices can help colleges and universities keep them secure.
News
•Jul 10, 2025

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

Partner POV | Cyera Data Security Platform Demo

Leverage data effectively across your organization and develop strategies that enhance both security and data utilization. Learn how Cyera can help your business enhance its data security.
Video
•8:42
•Jul 1, 2025

A CTO'S Primer on Q-Day: Part 5 - How Q-Day Threatens The Mid-Market

Quantum computing is rapidly approaching, and mid-market businesses are especially vulnerable. Without early preparation, encrypted data may be exposed, leading to breaches, financial loss and reputational damage. By adopting quantum-resistant encryption and assessing vulnerabilities now, businesses can stay secure, build trust and lead in a future where quantum readiness becomes a competitive advantage.
Blog
•Jun 27, 2025

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

8 Followers

At a glance

75Total
28Blogs
25Articles
10Videos
5Learning Paths
3Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • AI Security
  • Blog
  • AI & Data
  • Cloud
  • Cybersecurity Risk & Strategy
  • Cloud Security
  • Data Center
  • ATC
  • Data Protection & Cyber Recovery
  • Security Operations
  • Endpoint Security
  • Network Security
  • Applied AI
  • Cyber Range
  • Data Strategy and Architecture
  • GenAI
  • Varonis
  • OT Security
  • AI Proving Ground

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies