Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Cyera Data Security Platform

The Cyera Data Security Platform learning path offers a comprehensive exploration of Cyera's cloud-native data security solution, equipping learners with the knowledge to secure sensitive data across complex multi-cloud environments. Through hands-on labs and use case walkthroughs, participants will gain practical experience in data discovery, classification, policy enforcement, and risk remediation using Cyera's data security solution.
Learning Path

Deepfakes for Good? How AI is Powering the Next Era of Personalization

Can deepfakes go from dangerous to delightful? In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences. You'll learn: what deepfakes really are and why they're no longer just a security threat; how AI-powered personalization is reshaping the customer experience; and the ethical and technical challenges of using AI-generated content responsibly.
Video
•1:07
Apr 29, 2025

Cyera Foundations Lab

This Cyera Foundation Lab offers a hands-on experience with Cyera's data security platform, guiding users through real-world use cases like locating PCI data, identifying GDPR violations, and discovering exposed credentials. Learners will explore how Cyera enables continuous data discovery, classification, and risk-based insights across cloud environments.
Foundations Lab
78 launches

Online Gaming Security in an Evolving Landscape

As gaming companies continue to drive digital innovation, understanding the latest regulatory developments and implementing robust data privacy safeguards will be essential for maintaining player trust, mitigating risks and unlocking new opportunities while ensuring safe gaming.
WWT Research
•Dec 9, 2024

Redefining Gaming: Using Advanced Technologies to Exceed Gamers' Expectations

The gaming industry is undergoing a major transformation, driven by the rising expectations of gamers, the emergence of new technologies, and the convergence of physical, digital and virtual worlds.
WWT Research
•Aug 5, 2024

What's new

Secure Cloud: Complete

Uncover segmentation, data, application and API Risks in the cloud with WWT's Secure Cloud: Complete Accelerator
Assessment

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

The $2.3 Trillion Question: Why 84% of Digital Transformations Still Fail

Discover why most digital transformations struggle and learn practical strategies for success! This post explores how shifting from technology-first to business-first thinking can dramatically improve outcomes. Get actionable tips for aligning technology with real business needs and creating meaningful change that actually works.
Blog
•Jun 3, 2025

Partner POV | How to Navigate Data Security in the GenAI Era

To mitigate genAI risks, organizations should adopt zero trust principles and use security service edge (SSE) platforms, which integrate tools like cloud access security brokers (CASBs) to monitor and secure interactions with genAI. These measures help balance innovation with robust data security practices.
Partner Contribution
•Jun 2, 2025

A CTO'S Primer on Q-Day: Part 1 - The Post-Quantum Problem

Quantum computing's potential to break current encryption standards, known as Q-Day, poses a significant threat to cybersecurity. As experts race to develop post-quantum cryptography, balancing the risks and revolutionary potential of quantum technology is crucial for safeguarding our digital future.
Blog
•May 28, 2025

Cyera Data Security Platform

The Cyera Data Security Platform learning path offers a comprehensive exploration of Cyera's cloud-native data security solution, equipping learners with the knowledge to secure sensitive data across complex multi-cloud environments. Through hands-on labs and use case walkthroughs, participants will gain practical experience in data discovery, classification, policy enforcement, and risk remediation using Cyera's data security solution.
Learning Path

Partner POV | The Importance of How Data is Scanned

Data discovery and classification are the foundations for DSPM and data security, but how your data is scanned is more important than you may think.
Partner Contribution
•May 10, 2025

Partner POV | Varonis Named a Leader and Customer Favorite in The Forrester Wave™

Varonis was evaluated in The Forrester Wave™ and received high scores across its Current Offering and Strategy, including several 5/5 ratings.
Partner Contribution
•May 9, 2025

Partner POV | Don't Choose Between DSPM and DLP: Here's Why You Need Both

DSPM and DLP are essential, complementary tools that together secure data across its full lifecycle—DSPM identifies and assesses risk in data at rest, while DLP enforces real-time protection in motion. Integrated, they deliver stronger security, compliance, and threat response.
Partner Contribution
•Apr 30, 2025

Deepfakes for Good? How AI is Powering the Next Era of Personalization

Can deepfakes go from dangerous to delightful? In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences. You'll learn: what deepfakes really are and why they're no longer just a security threat; how AI-powered personalization is reshaping the customer experience; and the ethical and technical challenges of using AI-generated content responsibly.
Video
•1:07
•Apr 29, 2025

Cyera Foundations Lab

This Cyera Foundation Lab offers a hands-on experience with Cyera's data security platform, guiding users through real-world use cases like locating PCI data, identifying GDPR violations, and discovering exposed credentials. Learners will explore how Cyera enables continuous data discovery, classification, and risk-based insights across cloud environments.
Foundations Lab
•78 launches

Partner POV | Data Breaches in Healthcare

Varonis shows a significant rise in healthcare data breaches, posing severe risks to patient privacy and organizational integrity.
Partner Contribution
•Apr 21, 2025

Partner POV | AI-Driven Threat Detection: Revolutionizing Cyber Defense

Cyberthreats have evolved at an unprecedented pace, growing in both complexity and scale. Ransomware, phishing campaigns, and supply chain attacks have become more sophisticated, making traditional security measures feel sluggish and outdated. In today's digital landscape, where businesses operate across hybrid environments, real-time threat detection is no longer a luxury—it's a necessity.
Partner Contribution
•Apr 17, 2025

Partner POV | GenAI Readiness with BigID for Data, AI Security, & Compliance

BigID's unified platform supports future-proofing data security, enabling organizations to scale AI initiatives confidently.
Partner Contribution
•Apr 8, 2025

Partner POV | Rethinking Data Risk in the AI Era

Modern data risk is complex, with data spread across various environments and formats, creating visibility, siloed solutions, AI risks, and regulatory challenges. A unified, AI-powered approach is essential, integrating security, compliance, and AI governance.
Partner Contribution
•Apr 8, 2025

Partner POV | 3 Key Predictions for DSPM in 2025: The Future of Cloud Data Security

In 2025, the landscape of cloud data security will be incredibly dynamic and critical. As businesses increasingly migrate data to the public cloud, the need for robust, forward-thinking data security has never been more urgent. This shift will be driven by a myriad of factors, from the proliferation of stringent data regulations to the rise of sophisticated, AI-powered, cloud-driven data breaches. Given these factors, organizations will need to adopt proactive strategies such as data security with zero trust frameworks and AI-powered data security posture management (DSPM) to stay ahead of evolving threats.
Partner Contribution
•Apr 4, 2025

Partner POV | Future-Proof Your Data

Discover how Thales' quantum-safe encryption solutions future-proof your data security, protecting sensitive information against the evolving threats of quantum computing.
Video
•0:47
•Apr 1, 2025

Partner POV | PCI DSS Compliance Checklist and Guide

Explore the essential steps and requirements for achieving PCI DSS compliance, crucial for safeguarding sensitive credit card data.
Partner Contribution
•Apr 1, 2025

Partner POV | Data Security Platform

Gartner offers valuable insights into data security platforms help businesses protect sensitive data, stay compliant, and manage security risks, while evaluating vendors based on performance and future potential.
Video
•0:15
•Mar 26, 2025

Identity and Access Management

This Identity and Access Management (IAM) Learning Path provides a structured journey through the essentials of securing organizational resources and data. You'll begin with foundational IAM concepts—covering authentication, authorization, and the principle of least privilege. You will then progress to more advanced topics like Multi-Factor Authentication (MFA), Single Sign-On (SSO) & Privileged Access Management (PAM). By the end, you'll have a solid grasp of the over-all IAM framework & design principles.
Learning Path

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

4 Followers

At a glance

55Total
20Articles
19Blogs
5Learning Paths
5Videos
2Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • Cloud
  • AI & Data
  • Cloud Security
  • Blog
  • AI Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • ATC
  • Data Center
  • Data Protection & Cyber Recovery
  • Network Security
  • Security Operations
  • OT Security
  • Cyber Range
  • Data Strategy and Architecture
  • Varonis
  • Application & API Security
  • Applied AI
  • GenAI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies