Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Secure Cloud: Complete

Uncover segmentation, data, application and API Risks in the cloud with WWT's Secure Cloud: Complete Accelerator powered by Wiz, Cyera and Illumio
Assessment

Deepfake Deception: Can You Trust What You See and Hear?

Deepfakes are getting smarter — is your security strategy keeping up? On this episode of The AI Proving Ground Podcast, cybersecurity veterans Kent Noyes and Chris Roberts expose the latest deepfake tactics used by cybercriminals, discuss real-world attacks that have cost companies millions, and share strategies for staying ahead of this AI-driven threat. They'll also unpack the regulatory landscape and the broader geopolitical stakes at play.
Video
•1:46
Feb 11, 2025

Cyera Foundations Lab

This Cyera Foundation Lab offers a hands-on experience with Cyera's data security platform, guiding users through real-world use cases like locating PCI data, identifying GDPR violations, and discovering exposed credentials. Learners will explore how Cyera enables continuous data discovery, classification, and risk-based insights across cloud environments.
Foundations Lab
193 launches

Cyera Data Security Platform

The Cyera Data Security Platform learning path offers a comprehensive exploration of Cyera's cloud-native data security solution, equipping learners with the knowledge to secure sensitive data across complex multi-cloud environments. Through hands-on labs and use case walkthroughs, participants will gain practical experience in data discovery, classification, policy enforcement, and risk remediation using Cyera's data security solution.
Learning Path

Deepfakes for Good? How AI is Powering the Next Era of Personalization

Can deepfakes go from dangerous to delightful? In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences. You'll learn: what deepfakes really are and why they're no longer just a security threat; how AI-powered personalization is reshaping the customer experience; and the ethical and technical challenges of using AI-generated content responsibly.
Video
•1:07
Apr 29, 2025

What's new

Still Drowning in Your Data Lake?

Dear CIOs and CTOs, Congratulations! You finally convinced the board to invest millions in your data lake, and after only a decade of work, you've successfully centralized… well… a whole lot of unstructured sludge. That single source of truth you promised? More like a single point of confusion. And now — just as you're ready to sit back and bask in the glory of your petabyte-scale swamp — along comes something called agentic frameworks, and suddenly all that centralized data you've been hoarding seems about as useful as a dial-up modem at a 5G conference. Let's talk about why it's time to reconsider your data strategy.
Blog
•Jul 14, 2025

Opinion: How to Balance Learning Analytics With Data Privacy

The capacity of learning analytics platforms to collect troves of student data makes them both institutional necessities and liabilities. A handful of best practices can help colleges and universities keep them secure.
News
•Jul 10, 2025

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

Partner POV | Cyera Data Security Platform Demo

Leverage data effectively across your organization and develop strategies that enhance both security and data utilization. Learn how Cyera can help your business enhance its data security.
Video
•8:42
•Jul 1, 2025

A CTO'S Primer on Q-Day: Part 5 - How Q-Day Threatens The Mid-Market

Quantum computing is rapidly approaching, and mid-market businesses are especially vulnerable. Without early preparation, encrypted data may be exposed, leading to breaches, financial loss and reputational damage. By adopting quantum-resistant encryption and assessing vulnerabilities now, businesses can stay secure, build trust and lead in a future where quantum readiness becomes a competitive advantage.
Blog
•Jun 27, 2025

A CTO'S Primer on Q-Day: Part 4 - The Impact on Global Enterprises

Q-Day, the impending quantum computing breakthrough, threatens to render current encryption obsolete, exposing sensitive data across industries. As cyber criminals prepare to exploit this, organizations must urgently adopt quantum-resistant measures. The race against time is on. Proactive adaptation is crucial to safeguard digital security and ensure resilience in a post-quantum world.
Blog
•Jun 24, 2025

A CTO'S Primer on Q-Day: Part 3 - Building the Business Case for PQC

Quantum computing threatens current encryption, urging immediate action. Post-quantum cryptography (PQC) is essential for safeguarding data and maintaining trust. CTOs and CISOs must lead strategic transitions, aligning with regulatory timelines and leveraging external pressures. Early adoption ensures market leadership and resilience, transforming PQC from a technical task to a business-critical investment.
Blog
•Jun 24, 2025

A CTO'S Primer on Q-Day: Part 1 - The Post-Quantum Problem

Quantum computing's potential to break current encryption standards, known as Q-Day, poses a significant threat to cybersecurity. As experts race to develop post-quantum cryptography, balancing the risks and revolutionary potential of quantum technology is crucial for safeguarding our digital future.
Blog
•Jun 24, 2025

Partner POV | How AI Is Transforming Cybersecurity Practices

The cyberthreat landscape isn't just changing—it's transforming at breakneck speed, faster than most people can imagine.
Partner Contribution
•Jun 16, 2025

Secure Cloud: Complete

Uncover segmentation, data, application and API Risks in the cloud with WWT's Secure Cloud: Complete Accelerator powered by Wiz, Cyera and Illumio
Assessment

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

The $2.3 Trillion Question: Why 84% of Digital Transformations Still Fail

Discover why most digital transformations struggle and learn practical strategies for success! This post explores how shifting from technology-first to business-first thinking can dramatically improve outcomes. Get actionable tips for aligning technology with real business needs and creating meaningful change that actually works.
Blog
•Jun 3, 2025

Partner POV | How to Navigate Data Security in the GenAI Era

To mitigate genAI risks, organizations should adopt zero trust principles and use security service edge (SSE) platforms, which integrate tools like cloud access security brokers (CASBs) to monitor and secure interactions with genAI. These measures help balance innovation with robust data security practices.
Partner Contribution
•Jun 2, 2025

A CTO'S Primer on Q-Day: Part 2 - Post-Quantum Cryptography

Quantum computing threatens current encryption, urging immediate action from CISOs. As Q-Day nears, transitioning to post-quantum cryptography is crucial to protect sensitive data. Embrace hybrid cryptography, modernize inventories, and align with NIST standards to build resilience against quantum threats. Prepare today to secure tomorrow's digital landscape.
Blog
•May 28, 2025

Cyera Data Security Platform

The Cyera Data Security Platform learning path offers a comprehensive exploration of Cyera's cloud-native data security solution, equipping learners with the knowledge to secure sensitive data across complex multi-cloud environments. Through hands-on labs and use case walkthroughs, participants will gain practical experience in data discovery, classification, policy enforcement, and risk remediation using Cyera's data security solution.
Learning Path

Partner POV | The Importance of How Data is Scanned

Data discovery and classification are the foundations for DSPM and data security, but how your data is scanned is more important than you may think.
Partner Contribution
•May 10, 2025

Partner POV | Varonis Named a Leader and Customer Favorite in The Forrester Wave™

Varonis was evaluated in The Forrester Wave™ and received high scores across its Current Offering and Strategy, including several 5/5 ratings.
Partner Contribution
•May 9, 2025

Partner POV | Don't Choose Between DSPM and DLP: Here's Why You Need Both

DSPM and DLP are essential, complementary tools that together secure data across its full lifecycle—DSPM identifies and assesses risk in data at rest, while DLP enforces real-time protection in motion. Integrated, they deliver stronger security, compliance, and threat response.
Partner Contribution
•Apr 30, 2025

Deepfakes for Good? How AI is Powering the Next Era of Personalization

Can deepfakes go from dangerous to delightful? In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences. You'll learn: what deepfakes really are and why they're no longer just a security threat; how AI-powered personalization is reshaping the customer experience; and the ethical and technical challenges of using AI-generated content responsibly.
Video
•1:07
•Apr 29, 2025

Cyera Foundations Lab

This Cyera Foundation Lab offers a hands-on experience with Cyera's data security platform, guiding users through real-world use cases like locating PCI data, identifying GDPR violations, and discovering exposed credentials. Learners will explore how Cyera enables continuous data discovery, classification, and risk-based insights across cloud environments.
Foundations Lab
•193 launches

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

5 Followers

At a glance

63Total
25Blogs
21Articles
6Videos
5Learning Paths
2Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • Blog
  • AI & Data
  • Cloud
  • Cloud Security
  • AI Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • ATC
  • Data Center
  • Data Protection & Cyber Recovery
  • Network Security
  • Security Operations
  • OT Security
  • Applied AI
  • Cyber Range
  • Data Strategy and Architecture
  • Varonis
  • Application & API Security
  • Cyera

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies