Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

11 results found

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

AI Agents: Scaling Your Digital Workforce

Enterprise adoption of AI agents is spiking, with industry surveys showing most large enterprises are already piloting AI agents. But there's a lot of hype out there. In this episode of the AI Proving Ground Podcast, Technical Solutions Architect Ina Poecher and Jason Campagna, Senior Director of WWT's AI Practice, expose widespread "agent-washing," highlight practical but ROI-heavy use cases you can pursue now. Tune in to discover how agentic architecture turns generative AI hype into secure, measurable enterprise AI outcomes — and what's next for multi-agent ecosystems.
Video
•1:36
•Jul 22, 2025

AI Acceleration in Action: How AI in Higher Ed Is Balancing Innovation vs. Risk

AI is transforming higher education — from classrooms to research labs — but with innovation comes risk. How can universities protect sensitive data, meet compliance obligations, and still foster discovery? In this episode of the AI Proving Ground Podcast, WWT Higher Ed Principal Advisor Janet and Principal Cybersecurity Consultant for AI Bryan Fite share how one leading university is tackling AI governance and building guardrails that empower rather than restrict. Their insights reveal why higher ed is a proving ground for responsible AI adoption — and why every industry should be paying attention.
Video
•1:55
•Sep 9, 2025

Deepfake Deception: Can You Trust What You See and Hear?

Deepfakes are getting smarter — is your security strategy keeping up? On this episode of The AI Proving Ground Podcast, cybersecurity veterans Kent Noyes and Chris Roberts expose the latest deepfake tactics used by cybercriminals, discuss real-world attacks that have cost companies millions, and share strategies for staying ahead of this AI-driven threat. They'll also unpack the regulatory landscape and the broader geopolitical stakes at play.
Video
•1:46
•Feb 11, 2025

Deepfakes for Good? How AI is Powering the Next Era of Personalization

In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences.
Video
•1:07
•Apr 29, 2025

Introduction to Zero Trust

Introduction to Zero Trust provides a foundational understanding of the "never trust, always verify" security model, highlighting its necessity in today's distributed and threat-filled digital landscape. It introduces Microsoft's six-pillar framework for Zero Trust, outlining how their tools align with core principles like "Verify Explicitly," "Least Privilege," and "Assume Breach" across various organizational assets.
Video
•6:30
•Aug 7, 2025

Partner POV | Enhancing Security with WWT, ExtraHop and Gigamon

The newest Power of 3 offering features channel partner WWT and leading network security company ExtraHop to provide customers with real-time, precise threat detection by integrating the ExtraHop network detection and response (NDR) platform RevealX™ with the Gigamon Deep Observability Pipeline, sold and serviced by WWT.
Video
•43:28
•Sep 16, 2024

Partner POV | Cyera Data Security Platform Demo

Leverage data effectively across your organization and develop strategies that enhance both security and data utilization. Learn how Cyera can help your business enhance its data security.
Video
•8:42
•Jul 1, 2025

Partner POV | Data Security Platform

Gartner offers valuable insights into data security platforms help businesses protect sensitive data, stay compliant, and manage security risks, while evaluating vendors based on performance and future potential.
Video
•0:15
•Mar 26, 2025

Partner POV | Future-Proof Your Data

Discover how Thales' quantum-safe encryption solutions future-proof your data security, protecting sensitive information against the evolving threats of quantum computing.
Video
•0:47
•Apr 1, 2025

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

10 Followers

At a glance

78Total
28Articles
28Blogs
11Videos
5Learning Paths
2Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • AI & Data
  • AI Security
  • Blog
  • Cloud
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Data Center
  • Data Protection & Cyber Recovery
  • Endpoint Security
  • Security Operations
  • ATC
  • Network Security
  • Applied AI
  • GenAI
  • Varonis
  • Data Strategy and Architecture
  • AI Proving Ground
  • AI Proving Ground Podcast
  • Cyber Range

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies