Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

28 results found

The Role of Data Governance in Security and Risk Management

Data governance is an integral component of a comprehensive security and risk management program. Here's why and some frameworks available to put into practice.
Article
•Jun 10, 2023

Partner POV | How AI Is Transforming Cybersecurity Practices

The cyberthreat landscape isn't just changing—it's transforming at breakneck speed, faster than most people can imagine.
Partner Contribution
•Jun 16, 2025

IT Reimagined, a Way Forward for Operational Technology

In working with the largest, widespread manufacturers in the world, we've reimagined the IT infrastructure to support and sustain the OT side of the business, now and well into the future. Let's dive deep into the new way manufacturers are doing things.
Article
•Feb 21, 2024

Partner POV | Trellix Email and Collaboration Security Emerges as a Market Leader

In an era of AI-driven cyber threats, Trellix offers a comprehensive email and collaboration security solution. With elite detection accuracy, scalable analysis, and integrated human risk management, Trellix empowers organizations to stay ahead of evolving threats.
Partner Contribution
•Nov 5, 2025

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Partner POV | 3 Key Predictions for DSPM in 2025: The Future of Cloud Data Security

In 2025, the landscape of cloud data security will be incredibly dynamic and critical. As businesses increasingly migrate data to the public cloud, the need for robust, forward-thinking data security has never been more urgent. This shift will be driven by a myriad of factors, from the proliferation of stringent data regulations to the rise of sophisticated, AI-powered, cloud-driven data breaches. Given these factors, organizations will need to adopt proactive strategies such as data security with zero trust frameworks and AI-powered data security posture management (DSPM) to stay ahead of evolving threats.
Partner Contribution
•Apr 4, 2025

Partner POV | Varonis Acquires SlashNext, AI-Native Email Security

Varonis acquires SlashNext, integrating its AI-driven phishing detection into their Data Security Platform. This strategic move enhances threat detection from email to data, offering comprehensive protection against sophisticated social engineering attacks. By connecting email, identity, and data, Varonis aims to revolutionize data security and stop breaches before they begin.
Partner Contribution
•Sep 10, 2025

Partner POV | Cybersecurity in Data Centers: The Critical Role of Rack PDUs

In a hyperconnected world, data centers face escalating cyber threats, with rack PDUs as prime targets. Balancing convenience and security is crucial. Implementing AAA frameworks, robust encryption, and third-party certifications can mitigate risks. Collaboration between users and suppliers is essential to safeguard critical infrastructure and prevent costly breaches.
Partner Contribution
•Aug 6, 2025

Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication

Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025

Partner POV | What is Database Activity Monitoring? DAM Explained

Database Activity Monitoring (DAM) is vital for data security, detecting unauthorized access, and ensuring compliance. As data complexity grows, DAM's role in real-time threat detection and forensic analysis becomes crucial. Modern DAM solutions offer agentless, high-fidelity monitoring across diverse environments, enhancing security without performance trade-offs.
Partner Contribution
•Oct 24, 2025

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Partner POV | Data Theft in Salesforce: Manipulating Public Links

Varonis Threat Labs uncovered a vulnerability in Salesforce's public link feature that threat actors could exploit to retrieve sensitive data.
Partner Contribution
•Nov 14, 2024

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

10 Followers

At a glance

78Total
28Articles
28Blogs
11Videos
5Learning Paths
2Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • AI & Data
  • AI Security
  • Blog
  • Cloud
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Data Center
  • Data Protection & Cyber Recovery
  • Endpoint Security
  • Security Operations
  • ATC
  • Network Security
  • Applied AI
  • GenAI
  • Varonis
  • Data Strategy and Architecture
  • AI Proving Ground
  • AI Proving Ground Podcast
  • Cyber Range

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies