Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

74 results found

From Alerts to Action: Quantifying Cloud Risk with Wiz & WWT

Integrating Wiz CSPM issues for financially quantified risk insights
Blog
•Jul 24, 2025

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

A study in flexible innovation, and forming a new partnership based on trust.

The Filigran partnership enables our teams to provide new ways to enable a more holistic advanced persistent threat (APT) search and remediation methodology based on the combination of breach and attack simulation functions, while taking advantage of native integrations coupled with industry-standard, widely deployed agent technologies.
Blog
•Jul 17, 2025

The Quantum Computing Threat - Part 1

As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

Fortinet SD-WAN Success Will Innovate FortiSASE

For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
•Oct 21, 2024

The Quantum Computing Threat – Part 2

Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
•May 6, 2024

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

The MITRE ATT&CK Framework: A Beginner's Guide

As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024

The Zero Trust Balancing Act: Navigating the Tightrope to Secure Your Organization

Zero Trust is reshaping cybersecurity, driven by evolving threats and regulatory demands. However, its implementation is challenging, requiring a balance between grand strategy and tactical execution. Organizations must navigate this tightrope to avoid pitfalls and achieve true Zero Trust. Our team offers a step-by-step process to guide this complex journey.
Blog
•Nov 11, 2024

Secure All Together – Think About "The 3 R's"

In today's digital age, it is crucial to prioritize cybersecurity and focus on the three key areas of risk, resilience and recovery. By evaluating and mitigating risks, building resilience and having a well-defined recovery plan, organizations can enhance their security and ensure business continuity. Collaboration and embracing these principles can create a safer digital world.
Blog
•Aug 8, 2024

Innovative Regulatory Compliance Solutions for the Banking Industry

Banks must address an increasing volume of compliance directives from regulators. This blog post details WWT's multifaceted approach to mitigating regulatory risks through compliance automation, preventative risk management and continuous monitoring.
Blog
•Mar 25, 2024

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1113 Followers

At a glance

211Total
74Blogs
50Articles
23Videos
22Events
13Case Studies
7Briefings
7Labs
7Learning Paths
3Workshops
2Communities
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Network Security
  • Cyber Resilience
  • AI & Data
  • What we do
  • Cloud
  • Consulting Services
  • Cloud Security
  • ATC
  • Applied AI
  • Cisco
  • Fortinet
  • Endpoint Security
  • Financial Services
  • Healthcare
  • Cisco Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies