Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Services
Partners

Select a tab

37 results found

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Partner POV | Varonis Acquires SlashNext, AI-Native Email Security

Varonis acquires SlashNext, integrating its AI-driven phishing detection into their Data Security Platform. This strategic move enhances threat detection from email to data, offering comprehensive protection against sophisticated social engineering attacks. By connecting email, identity, and data, Varonis aims to revolutionize data security and stop breaches before they begin.
Partner Contribution
•Sep 10, 2025

Partner POV | Three Principles of Data Security in the AI Era

This article from Palo Alto Networks discusses the importance of prioritizing data security and three principles for developing an effective data security program in the AI Era.
Partner Contribution
•Aug 30, 2024

Partner POV | 3 Key Predictions for DSPM in 2025: The Future of Cloud Data Security

In 2025, the landscape of cloud data security will be incredibly dynamic and critical. As businesses increasingly migrate data to the public cloud, the need for robust, forward-thinking data security has never been more urgent. This shift will be driven by a myriad of factors, from the proliferation of stringent data regulations to the rise of sophisticated, AI-powered, cloud-driven data breaches. Given these factors, organizations will need to adopt proactive strategies such as data security with zero trust frameworks and AI-powered data security posture management (DSPM) to stay ahead of evolving threats.
Partner Contribution
•Apr 4, 2025

Partner POV | How AI Is Transforming Cybersecurity Practices

The cyberthreat landscape isn't just changing—it's transforming at breakneck speed, faster than most people can imagine.
Partner Contribution
•Jun 16, 2025

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Partner POV | DSPM and The AI Shared Responsibility Model

Data Security Posture Management (DSPM) plays a pivotal role in enhancing data governance for generative AI by addressing critical challenges such as data visibility, security, and compliance.
Partner Contribution
•Mar 3, 2025

Partner POV | GenAI Readiness with BigID for Data, AI Security, & Compliance

BigID's unified platform supports future-proofing data security, enabling organizations to scale AI initiatives confidently.
Partner Contribution
•Apr 8, 2025

Partner POV | How to Navigate Data Security in the GenAI Era

To mitigate genAI risks, organizations should adopt zero trust principles and use security service edge (SSE) platforms, which integrate tools like cloud access security brokers (CASBs) to monitor and secure interactions with genAI. These measures help balance innovation with robust data security practices.
Partner Contribution
•Jun 2, 2025

Partner POV | 3 Ways to Leverage AI to Improve Your Data Security Posture

AI is often seen as a solution to cybersecurity challenges, but its effectiveness depends on proper implementation and management.
Partner Contribution
•Aug 26, 2024

Partner POV | Secure-by-Design: Microsoft and Rubrik's Engineered Cyber Resilience Architecture

Cyber resilience transcends mere products, demanding architectural foresight and integration. Microsoft and Rubrik exemplify this through a "Secure-By-Design" approach, ensuring robust identity management, data sovereignty, and recovery workflows within Azure. This partnership fortifies organizations against disruptions, embedding resilience as an inherent architectural outcome, not an afterthought.
Partner Contribution
•Apr 20, 2026

Partner POV | Rethinking Data Risk in the AI Era

Modern data risk is complex, with data spread across various environments and formats, creating visibility, siloed solutions, AI risks, and regulatory challenges. A unified, AI-powered approach is essential, integrating security, compliance, and AI governance.
Partner Contribution
•Apr 8, 2025

Data Security

Data Security Home. WWT Capabilities around Data Security Posture Management (DSPM)

15 Followers

At a glance

99Total
37Articles
33Blogs
16Videos
5Learning Paths
2Briefings
2Labs
2WWT Research
1Assessment
1Workshop
What's related
  • Security
  • AI Security
  • Blog
  • AI & Data
  • Cybersecurity Risk & Strategy
  • Cloud
  • Cloud Security
  • ATC
  • Data Center
  • Security Operations
  • Data Protection & Cyber Recovery
  • Endpoint Security
  • Network Security
  • Data Strategy and Architecture
  • GenAI
  • Varonis
  • AI Proving Ground
  • AI Proving Ground Podcast
  • Data Analytics
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies