Overview
Explore
Labs
Services
Events
Partners
Select a tab
46 results found
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
Understanding Cisco ISE 3.x and the Benefits of Migrating from ISE 2.x to 3.x
Cisco Identity Services Engine (ISE) 3.x represents a significant upgrade over its predecessor, Cisco ISE 2.x, offering a host of new features, improved performance and enhanced security capabilities. This blog post delves into the key features of Cisco ISE 3.x and highlights the benefits of migrating from earlier versions, providing a thorough understanding of why this upgrade is essential for modern network environments.
Blog
•May 6, 2025
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
Cisco Firewalls are Hot Right Now and Here's Why!
With a lot of good news around Cisco Secure Firewalls recently, we decided to put them to the test, ATC style!
Blog
•Dec 20, 2024
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
Telecoms Security Act compliance: The challenges for service providers in 2024
Now that we've passed the first milestone for measures to be implemented, many service providers are progressing towards full TSA compliance – but are you on track to meet the 2028 deadline for completion?
Blog
•Jun 30, 2024
Network Access Control (NAC): A Key Component of Compliance
Network Access Control (NAC) is vital for organizations to secure networks and ensure compliance with regulatory frameworks like HIPAA, PCI-DSS and GDPR. By enforcing identity-based access, network segmentation and real-time monitoring, NAC mitigates cyber threats, prevents data breaches and maintains regulatory adherence, future-proofing organizational security.
Blog
•Feb 25, 2025
SSL Orchestrator Use Case: Secure Web Gateway (SWG) "as a Service"
This article explains how to run and configure Secure Web Gateway (SWG) "as a service" inside the Service Chain for an SSL Orchestrator.
Blog
•Jun 24, 2024
Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer
This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025
How Secure Is Voice Traffic in Your Contact Center?
Contact centers and voice calling have expanded the attack surface. While CISOs and cyber security leaders are doing their best to defend against bad actors, voice calling is a vulnerability that is often overlooked.
Blog
•Jan 3, 2024
Telecoms Security Act 2021 - The Journey to Compliance
The Telecoms Security Act requires UK telecom providers to have measures in place to identify and defend their networks from cyber threats, as well as prepare for any future risks. Learn about these regulations and how WWT can help.
Blog
•Dec 13, 2023
How Infoblox Powers the ATC
Empowering innovation and success through Infoblox critical network services, automation and security.
Blog
•Jul 1, 2024