Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

16 results found

The Art of Conflict: Cyber at War - How Iran's Retaliation is Shaping Critical Infrastructure and Global Enterprise Risk

Iran's retaliation model signals a period of active cyber probing coupled with sustained infrastructure targeting rather than a one-time shock event.
Blog
•Mar 3, 2026

Manufacturing at the EDGE: SCADA Instrumentation, Model Context Protocol and Agentic Design Patterns

Modern manufacturing is evolving towards data-centric, automated and intelligent systems that require contextualized operational data streaming from IoT-based edge devices converging with IT networks for adaptive real-time decision-making. MCP offers a structured approach to managing and interpreting diverse data streams, while SCADA systems serve as the core industrial instrumentation integrated with agentic methods and advanced inferencing to enhance manufacturing processes.
Blog
•Feb 13, 2026

NERC CIP-015 Compliance: A "How To" Guide for Power Utilities

NERC CIP‑015‑1 establishes Internal Network Security Monitoring (INSM) requirements for the Bulk Electric System and became effective on September 2, 2025. Compliance for registered U.S. electric utilities follows a phased approach, with completion required between 2028 and 2030, depending on system impact and connectivity.
Blog
•Mar 5, 2026

OT/IoT Security - Industry Insights

Operational Technology (OT) and Internet of Things (IoT) devices are both drivers of innovation and growing attack surfaces. For critical infrastructure and OT environments, where safety, availability, integrity and compliance are paramount, the convergence of IT and OT systems introduces complex vulnerabilities. We provide a structured, evidence-backed view of the key risks, real-world impacts and strategies to safeguard critical infrastructure from OT/IoT cyber threats.
Blog
•Aug 4, 2025

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

A Roadmap to Compliance with NERC PRC-005 for Power Utilities

Power utilities must comply with NERC PRC-005 by verifying the physical operation of protection system relays and breakers through independent Level Zero instrumentation. This ensures real-world actions match commands, addressing cybersecurity vulnerabilities and regulatory obligations while avoiding costly penalties.
Blog
•Oct 8, 2025

Cybersecurity Platforms vs. Point Solutions: Swiss Army Knives or Precision Tools?

This first article in a 5-part series explores the difference between cybersecurity platforms and point solutions. It explains how platforms offer unified, scalable protection while point solutions deliver specialized, best-in-class capabilities. Using simple analogies, it shows how these approaches tackle complex business challenges, setting the stage for deeper dives in upcoming articles.
Blog
•Dec 5, 2024

Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer

This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025

In Defense of Point Solutions: Why Specialized Cybersecurity Tools Shine

This second article in the 5-part series highlights the advantages of point solutions. It explains how these specialized tools deliver best-in-class protection, adapt quickly to specific challenges and provide focused ROI. Despite potential complexity, point solutions excel at addressing targeted security needs, making them a smart choice for businesses seeking precision and flexibility.
Blog
•Dec 16, 2024

The Case for Cybersecurity Platforms: Simplify, Integrate and Conquer

This third article in the 5-part series makes the case for cybersecurity platforms. It explores how platforms provide integrated, scalable protection, simplify management and deliver long-term cost efficiency. By unifying tools and reducing complexity, platforms offer businesses a streamlined, future-ready approach to cybersecurity without sacrificing quality or security efficacy.
Blog
•Dec 19, 2024

World Wide Technology at Downstream USA 2025: Powering Connections, Driving Innovation

World Wide Technology is proud to sponsor Downstream USA 2025 in Houston, TX. We'd be delighted to have you join us for our Main Stage Session on Wednesday, June 25, and our interactive Workshop on Thursday, June 26. Both sessions will showcase cutting-edge strategies and real-world applications designed to modernize infrastructure, enhance operational resilience, and drive data-driven performance at scale.
Blog
•Jun 20, 2025

WWT and Tanium at Converge 2025: Autonomous IT & Unstoppable Partnership

At Tanium Converge 2025, WWT showcased its strategic partnership with Tanium, emphasizing real-time, AI-driven risk management. Key innovations like Tanium Ask and Jump Gate highlight a shift towards Autonomous IT, enhancing operational efficiency and security. Together, WWT and Tanium empower organizations to transition from reactive to proactive IT management.
Blog
•Nov 24, 2025

OT Security

As industrial control systems (ICS) converge with enterprise networks and traditional IT environments, operational technology (OT) security helps ensure the safety and integrity of industrial operations including IoT assets that help control and monitor these environments.

229 Followers

At a glance

56Total
16Articles
16Blogs
8Case Studies
6Labs
4Learning Paths
2Events
2Videos
2WWT Research
What's related
  • Security
  • Security Operations
  • Armis
  • Digital
  • Internet of Things (IoT)
  • Manufacturing
  • ATC
  • Cybersecurity Risk & Strategy
  • Blog
  • AI Security
  • Network Security
  • asd-cyber-ioot
  • Cyber Range
  • Cloud
  • Cloud Security
  • Fortinet
  • Healthcare
  • Data Security
  • Endpoint Security
  • Zero Trust

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies