Zero Trust Insights
Filter by Content Types
- No options
100 results found
Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap
Join our virtual hands-on lab to explore Zscaler's Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler's modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You'll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats.
Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you'll be able to view all Zscaler modules and their settings in action.
Webinar
•Feb 5, 2026 • 11am
Integrating Dataminr into a Palo Alto Networks–Centric Platform
Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026
Cisco ACI Segmentation Migration Lab
Over the past few years many customers deploying ACI have opted for using the "Network-Centric" approach for implementing their ACI installations. Customers who no want to migrate to a Application-Centric approach often find their workloads are spread across multiple subnets, and grouping them by application is difficult. This lab provides a technique on how to make this migration simpler
Advanced Configuration Lab
•74 launches
Former NSA Cyber Director on the Emerging AI Threat Landscape
AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026
Illumio Zero Trust Segmentation Platform Overview
In today's hyper-connected, hybrid, multi-cloud world, cybersecurity incidents are increasingly targeted, costly, and disruptive, with breaches taking an average of 277 days to identify and contain and costing $4.45 million on average. Attackers exploit a lack of visibility and segmentation to access high-value assets, posing a significant threat to cyber resiliency. The Illumio Zero Trust Segmentation Platform offers a solution by providing unprecedented visibility across cloud, endpoint, and data center environments from a single console. It enables security teams to easily configure, deploy, and monitor segmentation, setting granular policies to control communications and isolate high-value assets, effectively stopping breaches and ransomware from spreading and strengthening cyber resiliency.
Video
•1:46
•Jan 13, 2026
Asset Mapping & Visibility with Illumio's Zero Trust Segmentation Platform
Attackers often have a deeper understanding of their target environments than the targets themselves, allowing them to quickly exploit weaknesses, especially with AI at their disposal. Without a clear understanding of network activities, organizations cannot secure their environments effectively. While segmenting critical assets can prevent ransomware spread, understanding risk and exposure is crucial for effective segmentation. The Illumio Zero Trust Segmentation platform supports a zero trust strategy by providing end-to-end visibility, mapping assets, identifying risks, and offering intelligence to reduce the attack surface. It allows organizations to map connectivity, reveal vulnerabilities, and build security strategies around actual risks, all from a single console. Illumio enhances cyber resilience by offering comprehensive visibility to identify and mitigate risks.
Video
•1:19
•Jan 13, 2026
Zero Trust Adoption Methodology
A vault door is only as secure as the strategy behind it. In the digital world, we often focus on the "door" (security tools) while ignoring the intelligent process required to govern who gets near our data, when they can access it and why. This video uses the commercial bank vault analogy to simplify the five foundational steps of a Zero Trust journey. Zero Trust isn't a one-time project; it's a repeatable process. Watch to see how these steps can be applied across your entire environment and how WWT can help you move from a whiteboard drawing to a validated, real-world roadmap.
Video
•11:33
•Jan 11, 2026
Zero Trust and The Risk You've Already Taken
Your organization is likely talking about zero trust somewhere at a technical level. However, unless it's being discussed by the enterprise risk owners, the impact it can have will never outweigh the cost and effort.
Blog
•Jan 7, 2026
Partner POV | Cyber-ready AI: Why Enterprise AI Security Can't Stay in the Sandbox
AI is exposing architectural limitations in traditional storage. Learn more about security-first storage and how it can scale with enterprise needs and evolving threats.
Partner Contribution
•Jan 2, 2026
Security Chiefs Sound Alarm Over 'Naked AI'
F5's Shawn Wormke and WWT's Chris Konrad say the rapid operationalization of AI is creating a widening gap between innovation and protection—leaving most organizations unprepared for real-world threats, governance failures and the coming quantum era.
Video
•1:10
•Dec 23, 2025
Zero Trust Helps Federal Agencies Move Software to Production Faster Share
IT officials, including WWT's Ramon Thomas, said zero trust supports rapid deployment, inventory visibility and stronger cybersecurity across IT and OT systems.
News
•Dec 18, 2025
Partner POV | Adapting to Modern Threats: Armis & Fortinet Deliver Measurable Cyber Resilience in OT
The convergence of IT, OT, and cloud systems has expanded attack surfaces, demanding seamless security solutions. Armis Centrix™ and Fortinet's integration offers real-time visibility and adaptive controls, ensuring operational resilience and compliance. This partnership enhances detection, containment, and response, safeguarding critical infrastructures with precision and speed.
Partner Contribution
•Dec 17, 2025