Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

19 results found

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

A CTO'S Primer on Q-Day: Part 2 - Post-Quantum Cryptography

Quantum computing threatens current encryption, urging immediate action from CISOs. As Q-Day nears, transitioning to post-quantum cryptography is crucial to protect sensitive data. Embrace hybrid cryptography, modernize inventories, and align with NIST standards to build resilience against quantum threats. Prepare today to secure tomorrow's digital landscape.
Blog
•May 28, 2025

The Time for Post Quantum Encryption is Now, Not Later

This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024

Wiz Continues to Grow their Platform

Wiz announces new features for their platform, showing why it continues to be a leader in the cloud-native application protection platform (CNAPP) market.
Blog
•Aug 13, 2024

The MITRE ATT&CK Framework: A Beginner's Guide

As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024

Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer

This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025

Forming a Responsible AI Team: A Practical Guide

As AI's influence expands, assembling a conscientious AI team—comprising both technical and non-technical members—becomes crucial. This diverse group collaborates to construct, implement and oversee AI systems ethically. This article will delve into the key procedures for forming an AI team.
Blog
•Jun 12, 2024

Intelligent Connections: How AI is Crafting the Next Generation of Connectivity

AI is transforming enterprise IT and network infrastructure. This blog explores the implications and benefits of the paradigm shift toward unified, enhanced network architectures.
Blog
•Feb 8, 2024

Understanding the Cybersecurity Kill Chain: A Simple Guide

As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the cybersecurity kill chain. We simplify and explain this model used by attackers to compromise your digital ecosystem.
Blog
•Nov 6, 2024

Architecting Intelligence: Laying the Foundation of AI Security via Data Governance

AI solutions require a certain level of data governance maturity to be safe and trustworthy. Learn why data governance success extends beyond mere data management to include data quality, security, compliance and proper classification.
Blog
•Feb 6, 2024

Security vs. Privacy, the Difference is Epic

Cyber teams need to understand the difference between security and privacy and apply them to every system in production.
Blog
•Aug 9, 2024

The Tail is Wagging the Dog More than Ever

It's time for cyber professionals to step up so we can fix the issues that have been plaguing our industry.
Blog
•Jul 29, 2024

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

4 Followers

At a glance

55Total
20Articles
19Blogs
5Learning Paths
5Videos
2Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • Cloud
  • AI & Data
  • Cloud Security
  • Blog
  • AI Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • ATC
  • Data Center
  • Data Protection & Cyber Recovery
  • Network Security
  • Security Operations
  • OT Security
  • Cyber Range
  • Data Strategy and Architecture
  • Varonis
  • Application & API Security
  • Applied AI
  • GenAI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies