Overview
Explore
Labs
Services
Events
Partners
Select a tab
26 results found
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
IGEL, You Have My Attention
IGEL Dual Boot, paired with Omnissa, revolutionizes ransomware recovery by enabling swift reboot into a clean IGEL OS, ensuring operational continuity. This innovative approach transforms endpoints from liabilities into recovery assets, minimizing downtime and enhancing resilience against cyberattacks. Embrace this breakthrough for rapid, effective recovery and sustained productivity.
Blog
•Apr 5, 2026
End User Computing Nerd vs the Great Firewall of China
Traveling to China for the holidays, I circumvented the Great Firewall of China to stay connected to the West. What worked and what didn't? While personal VPNs failed, using international roaming, VDI and an enterprise browser proved effective. This journey highlighted the challenges and solutions for maintaining internet access to the West in a highly restricted environment.
Blog
•Jan 20, 2025
InfoSecurity Europe 2022 Recap
Two WWT security experts share their key takeaways from InfoSec Europe — from the enhanced focus on the cloud and increased sophistication of attacks — and the ways we have to respond to threats and attacks — to WWT's station domination of Prince Regents.
Blog
•Jun 27, 2022
SSL Orchestrator Use Case: Secure Web Gateway (SWG) "as a Service"
This article explains how to run and configure Secure Web Gateway (SWG) "as a service" inside the Service Chain for an SSL Orchestrator.
Blog
•Jun 24, 2024
F5 Distributed Cloud L7 DDoS Mitigation
Learn how to use F5 Distributed Cloud to protect your applications from DDoS attacks.
Blog
•Jun 13, 2024
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
In Defense of Point Solutions: Why Specialized Cybersecurity Tools Shine
This second article in the 5-part series highlights the advantages of point solutions. It explains how these specialized tools deliver best-in-class protection, adapt quickly to specific challenges and provide focused ROI. Despite potential complexity, point solutions excel at addressing targeted security needs, making them a smart choice for businesses seeking precision and flexibility.
Blog
•Dec 16, 2024
Understanding the Cybersecurity Kill Chain: A Simple Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the cybersecurity kill chain. We simplify and explain this model used by attackers to compromise your digital ecosystem.
Blog
•Nov 6, 2024
Cybersecurity Platforms vs. Point Solutions: Swiss Army Knives or Precision Tools?
This first article in a 5-part series explores the difference between cybersecurity platforms and point solutions. It explains how platforms offer unified, scalable protection while point solutions deliver specialized, best-in-class capabilities. Using simple analogies, it shows how these approaches tackle complex business challenges, setting the stage for deeper dives in upcoming articles.
Blog
•Dec 5, 2024
Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer
This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025
The Case for Cybersecurity Platforms: Simplify, Integrate and Conquer
This third article in the 5-part series makes the case for cybersecurity platforms. It explores how platforms provide integrated, scalable protection, simplify management and deliver long-term cost efficiency. By unifying tools and reducing complexity, platforms offer businesses a streamlined, future-ready approach to cybersecurity without sacrificing quality or security efficacy.
Blog
•Dec 19, 2024