Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

38 results found

How Palo Alto Networks is Revolutionizing Security Operations with XSIAM

Cortex XSIAM revolutionizes cybersecurity by integrating AI, automation, and comprehensive visibility into a unified platform. Experience an autonomous SOC that empowers teams to focus on strategic threat hunting and proactive protection.
Article
•Apr 10, 2025

An Introduction to AI Model Security

Protecting AI models and the development environment is a major challenge given the complexity of underlying big data platforms and the mathematics required to understand attacks against modern AI algorithms.
Article
•Sep 15, 2023

What is Cyber Vault and How Does it Relate to Cyber Resilience?

With the ongoing threat of ransomware and malware attacks, organizations utilize a cyber vault to protect the mission critical data.
Article
•May 1, 2023

Five Considerations for Successful Identity and Access Management Architecture

Discover the five considerations needed to effectively incorporate Identity and Access Management (IAM) into your business.
Article
•Apr 14, 2025

Integrating Splunk SOAR and Cisco Secure Network Analytics

Splunk SOAR (security orchestration, automation and response) allows a Security Operations Center (SOC) to work smarter and more efficiently by executing a series of actions for security event and case management using automated workflows.
Article
•Feb 23, 2023

Simplifying Operations with Cybersecurity Platform Consolidation

Consolidating your cybersecurity estate provides clarity for organizations seeking to strengthen their cybersecurity posture and maximize the budget. Benefits include enhanced visibility, improved threat detection and response capabilities, simplified management, and cost savings.
Article
•Aug 1, 2023

Cisco Secure Edge + BlueCat: How Financial Services Firms Can Reduce Threat Response Time

With a quick and seamless integration of BlueCat DNS and Cisco Secure Edge (formerly Umbrella), one financial services firm cut their threat response time to just seconds.
Article
•Jun 3, 2023

Securing the Cloud: A Strategic Approach to Robust Cloud Security with WWT and Fortinet

Applications and data in the cloud need to be just as vigilantly protected as those that are on-premises yet with an entirely different approach.
Article
•Mar 28, 2024

Partner POV | New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks

Generative AI's integration into businesses is threatened by prompt attacks, which exploit vulnerabilities in AI models. Palo Alto Networks' report offers a taxonomy of these attacks, highlighting risks and solutions. Understanding and mitigating these threats is crucial for secure GenAI deployment, ensuring innovation thrives in a protected environment.
Partner Contribution
•Jun 11, 2025

The OT Security Architecture Reimagined

As the "factory of the future" becomes increasingly digitized, so grows the need for an intelligent OT security architecture. Here, we distinguish OT security principles from that of IT, and discuss how to apply them for increased productivity, reduced downtime and greater process safety and integrity.
Article
•Dec 11, 2023

Partner POV | Assessing Misconfigurations at Scale with Falcon Exposure Management

Misconfigurations often fly under the radar, but overlooking these risks can open the door to adversaries. Learn how to simplify configuration management for large environments.
Partner Contribution
•Mar 2, 2025

Partner POV | Cybersecurity Platformization

Learn how Platformization from Palo Alto Networks can help simplify and modernize your security approach.
Partner Contribution
•May 21, 2024

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

771 Followers

At a glance

166Total
57Blogs
38Articles
18Videos
15Labs
11Learning Paths
9Case Studies
8Events
5Briefings
3Workshops
1Community
1WWT Research
What's related
  • Security
  • Cybersecurity Risk & Strategy
  • Blog
  • Network Security
  • ATC
  • Endpoint Security
  • AI Security
  • Cyber Range
  • Cloud Security
  • Cloud
  • Palo Alto Networks
  • What we do
  • Cyber Resilience
  • Consulting Services
  • CrowdStrike
  • Cisco
  • OT Security
  • AI & Data
  • Cisco Security
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies