Overview
Explore
Events
Select a tab
52 results found
AI Security: Practicing Good Model File Security
As organizations continue to incorporate AI solutions into their workflows and user toolset, the requirements for securely creating, acquiring and storing large AI model files have grown significantly. This blog post explores the risks presented by third-party AI model files and best practices to guard against those risks.
Blog
•Sep 3, 2024
Hack the Future: AI Meets Security
World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025
Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians
Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023
Veriti and Check Point: Redefining Threat Exposure Management
An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
•Aug 7, 2023
Cisco Live 2025: Unlocking the Future of Compute & AI
Cisco Live 2025 showcased a transformative AI strategy, emphasizing scalable infrastructure and secure networking. Here are our takeaways and insights from an exciting week in San Diego.
Blog
•Jun 18, 2025
Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security
Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025
Leading the AI Revolution: Key Takeaways from the First Ai day
Discover the key insights from WWT's inaugural Ai day event in Dallas, where experts delved into practical AI applications, enterprise data strategies, and the balance of innovation and security in AI deployment.
Blog
•Oct 28, 2024
Combating Insurance Fraud with AI: Enhancing Detection Capabilities and Mitigating Risks
By analyzing large amounts of data to identify patterns and anomalies indicative of fraud, AI-powered fraud detection systems can improve efficiency and revolutionize customer experiences in the insurance industry.
Blog
•Jun 7, 2024
Fortinet SD-WAN Success Will Innovate FortiSASE
For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
•Oct 21, 2024
Cisco Live 2025: Smokin' Hot Security Infused in the Network with a side of AI to go!
Readout of highlights from the WWT Cisco Security support team that attended Cisco Live 2025.
Blog
•Jun 19, 2025