Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am

Security Operations

This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025.
WWT Research
•Jan 1, 2025

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network. IF THIS EVENT IS FULL, PLEASE HEAD OVER TO THE OCTOBER EVENT - https://www.wwt.com/event/68b0c1cca140c6b365be5894
Cyber Range
Sep 4, 2025 • 9am

Next-Generation Firewall (NGFW)

This learning series will explore Next-Generation Firewalls (NGFW), which are advanced network security devices that combine traditional firewall capabilities with additional features such as intrusion prevention, application awareness and control, and advanced threat protection. These firewalls go beyond the capabilities of traditional firewalls by providing deeper inspection of network traffic and more granular control over applications and user activities.
Learning Series

What's new

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network. IF THIS EVENT IS FULL, PLEASE HEAD OVER TO THE OCTOBER EVENT - https://www.wwt.com/event/68b0c1cca140c6b365be5894
Cyber Range
•Sep 4, 2025 • 9am

Akamai Guardicore Centra Foundations Lab

The Akamai Guardicore Centra Foundations Lab aims to give people a hands-on experience with the central segmentation solution through a variety of use cases.
Foundations Lab
•154 launches

Beyond XDR: The Critical Role of Next-Gen SIEM in SOC Evolution

XDR and NG-SIEM are evolving beyond the hype, emphasizing automation, enrichment and selective correlation over mere data centralization. Success lies in blending trustworthy point alerts with context-driven responses. Prioritize continuous improvement, leveraging existing tools to enhance detection and response capabilities without succumbing to alert fatigue or unnecessary complexity.
Blog
•Aug 22, 2025

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am

Partner POV | Armis at Black Hat USA 2025

Black Hat 2025 was a week of meaningful conversations and momentum. Armis' booth featured live demos, product deep dives, and sessions alongside several community events. Highlights included partner gatherings, spotlight presentations, and Armis "Win & Give" activation supporting St. Jude Children's Research Hospital, it was a week to remember.
Video
•1:39
•Aug 21, 2025

Partner POV | Forescout Midyear Threat Report: Numbers Grow in Nearly All the Wrong Places

Cyber threats are evolving, with Iranian hacktivists increasingly targeting OT/ICS systems. Ransomware and infostealers dominate, exploiting network vulnerabilities. Modbus is the most targeted OT protocol. Mitigation requires enhanced visibility, risk assessment, and proactive controls across IT, OT, and IoT environments. Prioritize multi-layered security to counteract these sophisticated threats.
Partner Contribution
•Aug 18, 2025

Tanium Integrated Lab

Tanium Integrated Lab Experience the transformative power of Tanium's Autonomous Endpoint Management at WWT's Advanced Technology Center. This integrated lab showcases real-time automation, enhancing IT operations and cybersecurity. Discover how Tanium, ServiceNow, and Microsoft Security solutions synergize to accelerate threat detection and response, shifting cybersecurity from reactive to proactive for robust resilience.
Advanced Configuration Lab
•5 launches

Partner POV | What Salesforce Organizations Need to Know About the Growing Vishing Threat

In the evolving cybersecurity landscape, social engineering, not technical exploits, poses the greatest threat. Groups like UNC6040 and Scattered Spider exploit human trust to breach Salesforce environments, risking data loss and reputational damage. Understanding and defending against these vishing tactics is crucial for safeguarding sensitive information and maintaining organizational integrity.
Partner Contribution
•Aug 11, 2025

Partner POV | DMV-Themed Phishing Campaign Targeting U.S. Citizens

In May 2025, a sophisticated phishing campaign targeted U.S. citizens by impersonating state DMVs through SMS and fake websites, harvesting personal data. Analysis links the attack to a China-based threat actor. The campaign's scale and impact highlight the urgent need for public awareness and robust cybersecurity measures.
Partner Contribution
•Aug 7, 2025

Partner POV | Cloudflare's Post-Quantum Game Plan

Quantum computing poses a dual-edged sword: promising innovation while threatening digital security. As criminals exploit "harvest now, decrypt later" strategies, organizations must transition to post-quantum cryptography. Embrace crypto agility and proactive planning to safeguard data against emerging quantum threats, ensuring long-term security and compliance in an evolving technological landscape.
Partner Contribution
•Jul 28, 2025

Partner POV | Armis Centrix™ for Early Warning for OT

Armis Centrix™ for Early Warning revolutionizes OT security by shifting from defense to offense. Harnessing AI, dark web insights, and HUMINT, it anticipates threats, neutralizes them preemptively, and addresses critical vulnerabilities. Protect your infrastructure with proactive intelligence, reducing risks and ensuring operational continuity. Transform your security posture today.
Partner Contribution
•Jul 25, 2025

Identity and Access Management Workshop

As identities span across internal, external, customer or a combination of the three, how are you managing them? What is your confidence level that you know who that identity belongs to? With the trend of "identity is the new perimeter," it is extremely vital that organizations have an IAM strategy and know how IAM can enable a business while strengthening their security posture.
Workshop

Core Routing Security: MACsec

The use of MACsec within network cores is exploding in popularity due to rising security demands and recent hardware advancements. This article explores MACsec's evolution, benefits and deployment considerations to help get you on your way to securing your high-speed core links.
Blog
•Jun 17, 2025

Partner POV | New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks

Generative AI's integration into businesses is threatened by prompt attacks, which exploit vulnerabilities in AI models. Palo Alto Networks' report offers a taxonomy of these attacks, highlighting risks and solutions. Understanding and mitigating these threats is crucial for secure GenAI deployment, ensuring innovation thrives in a protected environment.
Partner Contribution
•Jun 11, 2025

Tanium Proving Ground Lab

Tanium 7.6 Proving Ground Lab
Advanced Configuration Lab
•603 launches

CrowdStrike and ExtraHop Integrated Lab

WWT's ATC ExtraHop & Crowdstrike Integration Proving Ground Lab exists to provide a unified solution built around relevant use cases. It will showcase ExtraHop and CrowdStrike's integration to stop breaches before they can cause damage.
Advanced Configuration Lab
•60 launches

Exploring S7-1500 Factory IO Component Lab

This lab exposes the learner to Siemens TIA Portal as well as Factory IO. This is a great lab for someone looking to write their first Programmable Logic Controller (PLC) first project. The learner will build and control a simple conveyor belt system while monitoring the PLC logic and operations.
Foundations Lab
•105 launches

Core Routing Security: Protecting the Control Plane

Control plane protection is much more than just a checkbox; it's the best way to protect the brains of your core routers. In this article, you'll learn how to identify, classify and protect control plane traffic, leveraging built-in defenses and operational best practices to ensure core routing stability.
Blog
•May 30, 2025

CyberArk Privileged Account Management Lab

Explore the essential features of CyberArk Privileged Access Security (PAS) in this lab, showcasing its capabilities in managing and auditing privileged accounts across Windows and Linux environments. Discover how CyberArk PAS enhances security through automated password management and secure session monitoring.
Foundations Lab
•427 launches

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
•1561 launches

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

781 Followers

At a glance

173Total
58Blogs
42Articles
19Videos
13Labs
11Learning Paths
10Events
9Case Studies
5Briefings
4Workshops
1Community
1WWT Research
What's related
  • Security
  • Cybersecurity Risk & Strategy
  • Blog
  • Network Security
  • ATC
  • Endpoint Security
  • Cyber Range
  • AI Security
  • Cloud
  • Cloud Security
  • What we do
  • Palo Alto Networks
  • CrowdStrike
  • Consulting Services
  • Cyber Resilience
  • Cisco
  • OT Security
  • AI & Data
  • Cisco Security
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies