Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Services
Partners

Select a tab

32 results found

Partner POV | How AI Is Transforming Cybersecurity Practices

The cyberthreat landscape isn't just changing—it's transforming at breakneck speed, faster than most people can imagine.
Partner Contribution
•Jun 16, 2025

Partner POV | 3 Key Predictions for DSPM in 2025: The Future of Cloud Data Security

In 2025, the landscape of cloud data security will be incredibly dynamic and critical. As businesses increasingly migrate data to the public cloud, the need for robust, forward-thinking data security has never been more urgent. This shift will be driven by a myriad of factors, from the proliferation of stringent data regulations to the rise of sophisticated, AI-powered, cloud-driven data breaches. Given these factors, organizations will need to adopt proactive strategies such as data security with zero trust frameworks and AI-powered data security posture management (DSPM) to stay ahead of evolving threats.
Partner Contribution
•Apr 4, 2025

IT Reimagined, a Way Forward for Operational Technology

In working with the largest, widespread manufacturers in the world, we've reimagined the IT infrastructure to support and sustain the OT side of the business, now and well into the future. Let's dive deep into the new way manufacturers are doing things.
Article
•Feb 21, 2024

Partner POV | Post-Quantum Cryptography: What It Is and How It Works

Quantum computers threaten current encryption, necessitating post-quantum cryptography (PQC) to secure data against future quantum attacks. Organizations must transition to PQC, leveraging algorithms like Kyber and Dilithium, to protect sensitive information. Proactive adoption ensures long-term security, safeguarding data from the impending quantum era.
Partner Contribution
•Jan 29, 2026

Partner POV | GenAI Readiness with BigID for Data, AI Security, & Compliance

BigID's unified platform supports future-proofing data security, enabling organizations to scale AI initiatives confidently.
Partner Contribution
•Apr 8, 2025

Partner POV | How Cyera and Torq Automate Data Protection

Cyera and Torq revolutionize data protection by automating detection and response, transforming SOCs from reactive to autonomous. Their integration offers real-time visibility and instant remediation of data risks across cloud and SaaS environments, ensuring continuous, adaptive security. Discover how this partnership enhances data security intelligence and operational efficiency.
Partner Contribution
•Dec 3, 2025

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Partner POV | Eliminate Risk Blindspots with Multi-modal Fusion AI

Dataminr's Multi-Modal Fusion AI revolutionizes incident detection by integrating diverse data types—text, images, video, and more—into a unified model. This approach enables rapid, comprehensive threat analysis, enhancing organizational resilience and response times. By fusing disparate signals, it provides a complete, real-time context, surpassing traditional single-modality methods.
Partner Contribution
•Jan 7, 2026

Partner POV | Data Theft in Salesforce: Manipulating Public Links

Varonis Threat Labs uncovered a vulnerability in Salesforce's public link feature that threat actors could exploit to retrieve sensitive data.
Partner Contribution
•Nov 14, 2024

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Partner POV | Inside the Mind of CISOs: Key Insights from Proofpoint's 2025 Voice of the CISO Report

In 2025, CISOs face escalating cyber threats, data sprawl, and human vulnerabilities, despite strong cybersecurity cultures. The Voice of the CISO report reveals a paradox of confidence and concern, urging a shift towards smarter technology, robust governance, and strategic board engagement to transform organizational confidence into true resilience.
Partner Contribution
•Sep 12, 2025

Data Security

Data Security Home. WWT Capabilities around Data Security Posture Management (DSPM)

13 Followers

At a glance

88Total
32Articles
30Blogs
14Videos
5Learning Paths
2Briefings
2Labs
1Assessment
1Workshop
1WWT Research
What's related
  • Security
  • AI Security
  • AI & Data
  • Blog
  • Cloud
  • Cybersecurity Risk & Strategy
  • Cloud Security
  • ATC
  • Data Center
  • Security Operations
  • Data Protection & Cyber Recovery
  • Data Strategy and Architecture
  • Endpoint Security
  • GenAI
  • Network Security
  • Varonis
  • AI Proving Ground
  • AI Proving Ground Podcast
  • Applied AI
  • Data Analytics

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies