Zero Trust Insights
Filter by Content Types
- No options
106 results found
Illumio Zero Trust Segmentation Foundations
The Illumio Segmentation Lab is a demo intended to provide hands-on experience in performing both application dependency mapping and host-based segmentation using Illumio.
Foundations Lab
•Fundamentals
•152 launches
AI Security Is Now a Machine-Speed Problem
AI has moved the security goalposts. Organizations are being asked to pour more data into models to unlock value, while attackers use those same techniques to move at machine speed. In this episode of the AI Proving Ground Podcast, Fortinet's Aamir Lakhani and WWT's Dave Pisarek deliver a CISO-level playbook for enabling AI at scale while defending against AI-driven attacks — by tightening visibility and governance (especially for agents and shadow AI), modernizing identity and using automation to defend at machine speed without abandoning security fundamentals.
Video
•2:11
•Mar 3, 2026
Partner POV | Insights for 2026 from Forescout CEO, Barry Mainz
In 2026, Forescout and partners will tackle accelerated AI-driven threats with Universal Zero Trust Network Access, transforming defense strategies. By embedding operational AI, enhancing visibility, and ensuring quantum readiness, they aim to shift from reactive to proactive security, empowering partners to secure faster and adapt to evolving challenges in a complex digital landscape.
Partner Contribution
•Feb 23, 2026
Zscaler Zero Trust Lab
Zscaler is responsible for securing more than 400 of the Forbes Global 2000 companies. They provide security as a service delivered through a purpose-built, globally distributed platform. The focus of this lab is zero trust access utilizing a solution known as Zscaler Private Access (ZPA). ZPA is a cloud service that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications don't need to be exposed to the internet, making them completely invisible to unauthorized users. This service enables the applications to connect to users via inside-out connectivity versus extending the network to them. It disrupts legacy approaches to remote access such as traditional VPN, establishing per-service dynamic encryption and trust evaluation.
Foundations Lab
•Fundamentals
•1050 launches
Partner POV | The Visibility Gap Undermining OT and IOT Security
Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026
How To Accelerate Zero Trust Adoption
This panel discussion explores practical ways to accelerate Zero Trust adoption, highlighting shifts in cybersecurity strategy, the importance of early executive engagement, and actionable steps for launching a Zero Trust program.
Video
•16:22
•Feb 9, 2026
Zero Trust Frameworks
This panel discussion explores Zero Trust frameworks and how do they fit into your Zero Trust strategy.
Video
•16:21
•Feb 9, 2026
Security Priorities for 2026
A guide for security leaders to strengthen trust, reduce risk and build a more resilient, security-enabled enterprise
WWT Research
•Feb 9, 2026
SSE Technology Evaluation
In this report, we evaluate the strengths and weaknesses of leading SSE solutions relative to key innovation factors shaping a rapidly evolving market.
WWT Research
•Feb 1, 2026
Integrating Dataminr into a Palo Alto Networks–Centric Platform
Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026
Cisco ACI Segmentation Migration Lab
Over the past few years many customers deploying ACI have opted for using the "Network-Centric" approach for implementing their ACI installations. Customers who no want to migrate to a Application-Centric approach often find their workloads are spread across multiple subnets, and grouping them by application is difficult. This lab provides a technique on how to make this migration simpler
Advanced Configuration Lab
•Intermediate
•74 launches
Former NSA Cyber Director on the Emerging AI Threat Landscape
AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026