Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

70 results found

A CTO's Primer on Breach & Attack Simulation: Part 1 - Market Landscape

Breach and attack simulation (BAS) tools are revolutionizing cybersecurity by automating threat testing. While tools like AttackIQ and Mandiant Security Validation lead the market, organizations must prioritize their unique needs over flashy features. This article explores how to select the right BAS solution to align with strategic goals and optimize security.
Blog
•Apr 2, 2025

Department of War (DoW) Issues Success Memo for WWT's Joint Cyber Hunt Kit (JCHK) Prototype

The recognition from the DoW's Defense Innovation Unit (DIU) marks a meaningful step forward in how Cyber Protection Teams (CPTs) carry out their missions.
Blog
•Dec 3, 2025

Texas A&M University System Teams Up with WWT for Cyber Range Challenge

Texas A&M University Systems partners with WWT for a Cyber Range Capture the Flag competition, empowering students with hands-on threat-hunting experience. Sponsored by industry leaders, this event highlights Texas A&M's commitment to reinvesting in its students and preparing future cybersecurity professionals.
Blog
•Dec 15, 2025

Introduction to Cortex XDR

Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023

A Practitioner's Guide: SOC of the Future

Is the future here? Can we build a scalable, agile foundation that leverages robust data management and pipelines to enable real-time alerting? Can it leverage AI-augmentation and automated responses to proactively detect and mitigate threats? I think we may be close...
Blog
•Mar 10, 2025

Understanding Salt Typhoon: Why Security Leaders Should Take Notice

Salt Typhoon, a Chinese state-sponsored cyber espionage campaign, has targeted critical U.S. telecommunications infrastructure, exposing vulnerabilities and compromising sensitive data. This sophisticated operation underscores the urgent need for robust cybersecurity measures and heightened awareness among security leaders to protect against evolving threats.
Blog
•Feb 7, 2025

Core Routing Security: Hardening the Routing Protocols

Hardening your core routing protocols, such as ISIS, OSPF and BGP, is one of the simplest and cheapest ways to immediately improve your security posture. This post explores practical steps to secure routing adjacencies, filter route updates and reduce overall exposure in the control plane of your core network.
Blog
•Sep 4, 2025

SentinelOne OneCon 2025: Redefining the Future of AI-Driven Security

SentinelOne isn't afraid to take on the hard problems. Too often, as practitioners, we are faced with having to make concessions in our security program for the sake of waiting on our OEM of choice to innovate, acquire or deliver on feature-rich promises over the years of our contract terms. If there is one thing that 2025 has taught me is that SentinelOne is facing those head-on.
Blog
•Nov 12, 2025

SIEM Overload to Smart Security: The Power of Data Pipeline and Modern Storage

Traditional SIEMs have long been treated as massive log repositories, leading to skyrocketing costs and visibility gaps. Data pipeline management changes the game — optimizing log ingestion, enriching security data, and reducing SIEM costs without sacrificing detection capabilities. Learn how modern data pipelines, security data lakes and AI-driven analytics are transforming SOC efficiency and redefining how organizations manage security telemetry.
Blog
•Feb 26, 2025

A Practitioner's Guide: Automation within Security Operations

Security operations automation has evolved from basic manual processes to sophisticated, AI-enhanced workflows. Traditional SOAR helps standardize these tasks, but newer "hyperautomation" platforms promise to take it further with cloud-native architectures and built-in AI.
Blog
•Jan 30, 2025

Navigating the SIEM Journey: Insights, Challenges and the Future

Discover the power of Security Information and Event Management (SIEM) in modern cybersecurity. This blog explores how SIEM consolidates data, detects threats, enhances compliance and empowers SOC teams to stay ahead of cyber adversaries. Learn about its benefits, challenges and the future of SIEM in defending against evolving threats while optimizing your security operations.
Blog
•Jan 10, 2025

Core Routing Security: MACsec

The use of MACsec within network cores is exploding in popularity due to rising security demands and recent hardware advancements. This article explores MACsec's evolution, benefits and deployment considerations to help get you on your way to securing your high-speed core links.
Blog
•Jun 17, 2025

Security Operations

Security operations purpose is to monitor, prevent, detect, investigate, and respond to digital and human threats to enterprise assets. Such assets are intellectual property, personnel data, customer data, business and IT systems.

788 Followers

At a glance

186Total
70Blogs
48Articles
17Videos
16Labs
10Learning Paths
9Case Studies
7Events
3Briefings
3WWT Research
2Workshops
1Community
What's related
  • Security
  • Blog
  • Cybersecurity Risk & Strategy
  • AI Security
  • Network Security
  • ATC
  • Endpoint Security
  • Cyber Range
  • Cloud Security
  • Cloud
  • Cyber Resilience
  • OT Security
  • Palo Alto Networks
  • CrowdStrike
  • What we do
  • AI & Data
  • Whole-of-state cybersecurity
  • Fortinet
  • Consulting Services
  • Data Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies