Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Events

Select a tab

52 results found

AI Security: Practicing Good Model File Security

As organizations continue to incorporate AI solutions into their workflows and user toolset, the requirements for securely creating, acquiring and storing large AI model files have grown significantly. This blog post explores the risks presented by third-party AI model files and best practices to guard against those risks.
Blog
•Sep 3, 2024

Hack the Future: AI Meets Security

World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025

Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians

Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025

The Quantum Computing Threat - Part 1

As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

How Generative AI Impacts Identity and Access Management

Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
•Aug 7, 2023

Cisco Live 2025: Unlocking the Future of Compute & AI

Cisco Live 2025 showcased a transformative AI strategy, emphasizing scalable infrastructure and secure networking. Here are our takeaways and insights from an exciting week in San Diego.
Blog
•Jun 18, 2025

Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security

Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025

Leading the AI Revolution: Key Takeaways from the First Ai day

Discover the key insights from WWT's inaugural Ai day event in Dallas, where experts delved into practical AI applications, enterprise data strategies, and the balance of innovation and security in AI deployment.
Blog
•Oct 28, 2024

Combating Insurance Fraud with AI: Enhancing Detection Capabilities and Mitigating Risks

By analyzing large amounts of data to identify patterns and anomalies indicative of fraud, AI-powered fraud detection systems can improve efficiency and revolutionize customer experiences in the insurance industry.
Blog
•Jun 7, 2024

Fortinet SD-WAN Success Will Innovate FortiSASE

For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
•Oct 21, 2024

Cisco Live 2025: Smokin' Hot Security Infused in the Network with a side of AI to go!

Readout of highlights from the WWT Cisco Security support team that attended Cisco Live 2025.
Blog
•Jun 19, 2025

AI Security

AI security helps harness AI's potential while mitigating emerging threats, ensuring safe, compliant and ethical use across the organization.

128 Followers

At a glance

183Total
52Blogs
49Articles
38Videos
16Events
10Labs
10WWT Research
3Learning Paths
2Briefings
1Assessment
1Case Study
1Playlist
What's related
  • Security
  • AI & Data
  • Applied AI
  • Cybersecurity Risk & Strategy
  • Blog
  • WWT Presents
  • AI Proving Ground
  • ATC
  • Security Operations
  • GenAI
  • Cisco
  • Application & API Security
  • Palo Alto Networks
  • Cisco AI Solutions
  • Data Security
  • Network Security
  • Cyber Resilience
  • Cisco Security
  • Cloud
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies