Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

9 results found

End User Computing Nerd vs the Great Firewall of China

Traveling to China for the holidays, I circumvented the Great Firewall of China to stay connected to the West. What worked and what didn't? While personal VPNs failed, using international roaming, VDI and an enterprise browser proved effective. This journey highlighted the challenges and solutions for maintaining internet access to the West in a highly restricted environment.
Blog
•Jan 20, 2025

Onum, Pangea and the Path to the Agentic SOC: Highlights from Fal.Con 2025

AI is revolutionizing cybersecurity, transforming both attackers and defenders. At Fal.Con 2025, CrowdStrike unveiled its vision of an agentic SOC powered by intelligent agents and streaming pipelines. This shift towards AI-native security platforms aims to enhance collaboration, autonomy and governance, heralding a new era of intelligent, proactive security operations.
Blog
•Sep 19, 2025

The State of Cloud Security: As Told by CrowdStrike

In 2025, CrowdStrike's Global Threat Report reveals cyber adversaries adopting business-like efficiency, especially in cloud environments. Scattered Spider, a notorious group, inspires others, leading to a surge in cloud intrusions. CrowdStrike's Falcon Cloud Security offers robust solutions, integrating threat detection and proactive measures to combat these evolving threats.
Blog
•Aug 4, 2025

CrowdStrike's Fal.Con 2023 Key Takeaways

CrowdStrike's Fal.Con 2023 provided intriguing announcements about an upcoming acquisition, additional modules and key integrations that are moving CrowdStrike closer to a platform consolidation strategy. Here's a recap of this exciting event.
Blog
•Sep 22, 2023

Cloud Security: Announcements from Fal.con 2025

Crowdstrike continues to add new features to their platform, making Falcon Cloud Security a top contender when enterprises consider how they are going to secure their cloud investment, including AI applications in the cloud.
Blog
•Sep 29, 2025

RSA Conference 2022 Recap

Four WWT security experts share their key takeaways from RSAC 2022.
Blog
•Jun 14, 2022

InfoSecurity Europe 2022 Recap

Two WWT security experts share their key takeaways from InfoSec Europe — from the enhanced focus on the cloud and increased sophistication of attacks — and the ways we have to respond to threats and attacks — to WWT's station domination of Prince Regents.
Blog
•Jun 27, 2022

2022 Gartner Security & Risk Management Summit Recap

WWT's Chris Konrad and Kent Noyes provide their key takeaways and notable insights from Gartner's annual Security & Risk Management Summit.
Blog
•Jun 14, 2022

AWS re:Invent 2022 Recap

Our experts share their thoughts and excitement in the wake of this year's premier cloud computing event.
Blog
•Dec 9, 2022

CrowdStrike

CrowdStrike solutions help strengthen security posture for customers, with machine learning, AI, and proactive threat hunting providing an easy turnkey solution.

103 Followers

At a glance

50Total
16Articles
10Videos
9Blogs
5Labs
3Briefings
3Events
2Case Studies
2Learning Paths
What's related
  • Security
  • Endpoint Security
  • Security Operations
  • AI Security
  • Cloud
  • Cloud Security
  • Cyber Range
  • Blog
  • ATC
  • Cybersecurity Risk & Strategy
  • CrowdStrike Falcon Insight
  • Network Security
  • CrowdStrike Falcon X
  • Identity and Access Management
  • AI & Data
  • Financial Services
  • Zero Trust
  • Applied AI
  • Cloud Marketplace
  • Consulting Services

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies