Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Services

Select a tab

What's popular

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Data Protection: Ensuring Integrated NVIDIA AI Security at Scale

Learn how a data-centric, zero trust approach can fortify your organization's most valuable asset: Its data. With maturity models, AI-specific strategies and implementation best practices, this guide will help you build resilient, compliant and recovery-ready data protection across hybrid and high-performance environments.
WWT Research
•Jan 5, 2026

The $2.3 Trillion Question: Why 84% of Digital Transformations Still Fail

Discover why most digital transformations struggle and learn practical strategies for success! This post explores how shifting from technology-first to business-first thinking can dramatically improve outcomes. Get actionable tips for aligning technology with real business needs and creating meaningful change that actually works.
Blog
•Jun 3, 2025

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
Oct 21, 2025

Partner POV | How AI Is Transforming Cybersecurity Practices

The cyberthreat landscape isn't just changing—it's transforming at breakneck speed, faster than most people can imagine.
Partner Contribution
•Jun 16, 2025

What's new

Milan 2026: Securing the Upcoming Winter Games in an Age of Hyper-Connectivity and AI-Driven Chaos

The expanding digital ecosystem of the Winter Games demands identity-first, AI-aware security heading into Milan 2026.
Blog
•Feb 5, 2026

Partner POV | Post-Quantum Cryptography: What It Is and How It Works

Quantum computers threaten current encryption, necessitating post-quantum cryptography (PQC) to secure data against future quantum attacks. Organizations must transition to PQC, leveraging algorithms like Kyber and Dilithium, to protect sensitive information. Proactive adoption ensures long-term security, safeguarding data from the impending quantum era.
Partner Contribution
•Jan 29, 2026

Partner POV | Eliminate Risk Blindspots with Multi-modal Fusion AI

Dataminr's Multi-Modal Fusion AI revolutionizes incident detection by integrating diverse data types—text, images, video, and more—into a unified model. This approach enables rapid, comprehensive threat analysis, enhancing organizational resilience and response times. By fusing disparate signals, it provides a complete, real-time context, surpassing traditional single-modality methods.
Partner Contribution
•Jan 7, 2026

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Data Security Posture Management (DSPM) Workshop

Workshop

Data Protection: Ensuring Integrated NVIDIA AI Security at Scale

Learn how a data-centric, zero trust approach can fortify your organization's most valuable asset: Its data. With maturity models, AI-specific strategies and implementation best practices, this guide will help you build resilient, compliant and recovery-ready data protection across hybrid and high-performance environments.
WWT Research
•Jan 5, 2026

Data Security Posture Management (DSPM) Briefing

In this briefing, we will work with your key stakeholders to identify where your data is located, who is accessing it, how and where it's moving and how does this align with your governance, risk and compliance policies. Our experts will discuss how we help customers identify gaps in your data security and we will help identify how to best implement and operationalize a DSPM platform.
Briefing

Inside NVIDIA: The $5 Trillion Engine Redefining the Future of AI

AI is rewriting the rules of the global economy. Powered by leaps in accelerated computing, digital twins and autonomous systems, a new industrial era is emerging in real time. In this episode of the AI Proving Ground Podcast, NVIDIA leaders Jay Puri, Charlie Wuischpard and Craig Weinstein break down how the entire AI stack — from the silicon driving breakthroughs to the software shaping intelligent experiences — is redefining how we build, operate and compete. This conversation gives leaders a clear view of what's coming next—and what it takes to align their organizations, scale AI innovation, and stay ahead in a race where velocity, architecture, and ambition now determine advantage.
Video
•0:58
•Dec 5, 2025

Partner POV | How Cyera and Torq Automate Data Protection

Cyera and Torq revolutionize data protection by automating detection and response, transforming SOCs from reactive to autonomous. Their integration offers real-time visibility and instant remediation of data risks across cloud and SaaS environments, ensuring continuous, adaptive security. Discover how this partnership enhances data security intelligence and operational efficiency.
Partner Contribution
•Dec 3, 2025

Securing the AI Surge with Check Point's GenAI Protect

This blog explores how GenAI has surged into daily workflows, often without visibility or guardrails, and why organizations must secure this adoption without slowing productivity. It explains the risks of shadow AI, the value of Check Point's GenAI Protect and how WWT's AI Proving Ground accelerates safe, multivendor GenAI deployment across modern enterprise environments.
Blog
•Nov 20, 2025

NVIDIA: The $5 Trillion Engine Driving the Future of Industry

AI is driving transformation across all industries, fueled by breakthroughs in computing power, digital twins, and autonomous systems. NVIDIA executives Jay Puri, Charlie Wuischpard and Craig Weinstein unpack how the full AI stack—from silicon to software—is reshaping industries and redefining how we live, work, and interact with the world. Leaders will learn what it takes to align their organizations behind AI in order to scale innovation and stay competitive in the race to harness this momentum.
Video
•0:58
•Nov 18, 2025

The New Energy Paradigm

As AI adoption accelerates, the pressure mounts to modernize the energy and security infrastructure that powers data-driven innovation. This conversation brings together leaders at the intersection of energy, technology, and cybersecurity to explore the strategic investments required to meet rising demands—securely and sustainably. Executives will learn the decisions they need to make now to reduce risk, unlock value, and lead through a rapidly evolving energy and AI landscape.
Video
•0:58
•Nov 17, 2025

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Partner POV | Trellix Email and Collaboration Security Emerges as a Market Leader

In an era of AI-driven cyber threats, Trellix offers a comprehensive email and collaboration security solution. With elite detection accuracy, scalable analysis, and integrated human risk management, Trellix empowers organizations to stay ahead of evolving threats.
Partner Contribution
•Nov 5, 2025

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Partner POV | What is Database Activity Monitoring? DAM Explained

Database Activity Monitoring (DAM) is vital for data security, detecting unauthorized access, and ensuring compliance. As data complexity grows, DAM's role in real-time threat detection and forensic analysis becomes crucial. Modern DAM solutions offer agentless, high-fidelity monitoring across diverse environments, enhancing security without performance trade-offs.
Partner Contribution
•Oct 24, 2025

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025

Data Security Use Cases and Emerging Trends

This learning path covers data security strategies, real-world use cases, and emerging trends shaping the future of data & cyber security. This learning path also covers foundational principles, advanced threat mitigation, & the various data protection technologies.
Learning Path

Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication

Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025

Why Quantum Computing Threat Will Impact "Absolutely Everyone" In Security: Experts

The fact that the date of "Q-Day" is unknown may ultimately be irrelevant, since post-quantum encryption is on track to become a business and compliance obligation in coming years, experts tell CRN.
News
•Oct 8, 2025

Data Security

Data Security Home. WWT Capabilities around Data Security Posture Management (DSPM)

13 Followers

At a glance

87Total
31Articles
30Blogs
14Videos
5Learning Paths
2Briefings
2Labs
1Assessment
1Workshop
1WWT Research
What's related
  • Security
  • AI Security
  • AI & Data
  • Blog
  • Cloud
  • Cybersecurity Risk & Strategy
  • Cloud Security
  • ATC
  • Data Center
  • Security Operations
  • Data Protection & Cyber Recovery
  • Data Strategy and Architecture
  • Endpoint Security
  • GenAI
  • Network Security
  • Varonis
  • AI Proving Ground
  • AI Proving Ground Podcast
  • Applied AI
  • Data Analytics

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies