Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

11 results found

AI Acceleration in Action: How AI in Higher Ed Is Balancing Innovation vs. Risk

AI is transforming higher education — from classrooms to research labs — but with innovation comes risk. How can universities protect sensitive data, meet compliance obligations, and still foster discovery? In this episode of the AI Proving Ground Podcast, WWT Higher Ed Principal Advisor Janet and Principal Cybersecurity Consultant for AI Bryan Fite share how one leading university is tackling AI governance and building guardrails that empower rather than restrict. Their insights reveal why higher ed is a proving ground for responsible AI adoption — and why every industry should be paying attention.
Video
•1:55
•Sep 9, 2025

AI Agents: Scaling Your Digital Workforce

Enterprise adoption of AI agents is spiking, with industry surveys showing most large enterprises are already piloting AI agents. But there's a lot of hype out there. In this episode of the AI Proving Ground Podcast, Technical Solutions Architect Ina Poecher and Jason Campagna, Senior Director of WWT's AI Practice, expose widespread "agent-washing," highlight practical but ROI-heavy use cases you can pursue now. Tune in to discover how agentic architecture turns generative AI hype into secure, measurable enterprise AI outcomes — and what's next for multi-agent ecosystems.
Video
•1:36
•Jul 22, 2025

Deepfakes for Good? How AI is Powering the Next Era of Personalization

In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences.
Video
•1:07
•Apr 29, 2025

Partner POV | Cyera Data Security Platform Demo

Leverage data effectively across your organization and develop strategies that enhance both security and data utilization. Learn how Cyera can help your business enhance its data security.
Video
•8:42
•Jul 1, 2025

Deepfake Deception: Can You Trust What You See and Hear?

Deepfakes are getting smarter — is your security strategy keeping up? On this episode of The AI Proving Ground Podcast, cybersecurity veterans Kent Noyes and Chris Roberts expose the latest deepfake tactics used by cybercriminals, discuss real-world attacks that have cost companies millions, and share strategies for staying ahead of this AI-driven threat. They'll also unpack the regulatory landscape and the broader geopolitical stakes at play.
Video
•1:46
•Feb 11, 2025

Zero Trust Data: Microsoft Purview

Module 5 focuses on Zero Trust for Data, introducing Microsoft Purview as the comprehensive solution. It emphasizes assuming breach and protecting data regardless of location. Purview enables discovery, classification, and persistent protection using Sensitivity Labels (encryption, access restrictions) and prevents unauthorized sharing with Data Loss Prevention (DLP), ensuring data remains secure throughout its lifecycle.
Video
•9:16
•Sep 9, 2025

Partner POV | Enhancing Security with WWT, ExtraHop and Gigamon

The newest Power of 3 offering features channel partner WWT and leading network security company ExtraHop to provide customers with real-time, precise threat detection by integrating the ExtraHop network detection and response (NDR) platform RevealX™ with the Gigamon Deep Observability Pipeline, sold and serviced by WWT.
Video
•43:28
•Sep 16, 2024

Partner POV | Data Security Platform

Gartner offers valuable insights into data security platforms help businesses protect sensitive data, stay compliant, and manage security risks, while evaluating vendors based on performance and future potential.
Video
•0:15
•Mar 26, 2025

Introduction to Zero Trust

Introduction to Zero Trust provides a foundational understanding of the "never trust, always verify" security model, highlighting its necessity in today's distributed and threat-filled digital landscape. It introduces Microsoft's six-pillar framework for Zero Trust, outlining how their tools align with core principles like "Verify Explicitly," "Least Privilege," and "Assume Breach" across various organizational assets.
Video
•6:30
•Aug 7, 2025

Microsoft within Workplace Zero Trust

Microsoft within Workplace Zero Trust outlines Microsoft's Zero Trust strategy, focusing on four key workplace pillars: Identities, Endpoints, Applications, and Data. It provides a high-level overview of the six integrated Microsoft security product families, including Microsoft Entra, Microsoft Intune, and Microsoft Defender, that work together to implement this Zero Trust model
Video
•6:01
•Sep 9, 2025

Partner POV | Future-Proof Your Data

Discover how Thales' quantum-safe encryption solutions future-proof your data security, protecting sensitive information against the evolving threats of quantum computing.
Video
•0:47
•Apr 1, 2025

Data Security

Keep data safe from unauthorized access using policies and procedures executed by people and technology.

7 Followers

At a glance

75Total
28Blogs
24Articles
11Videos
5Learning Paths
3Labs
2WWT Research
1Assessment
1Briefing
What's related
  • Security
  • Blog
  • AI Security
  • AI & Data
  • Cloud
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Data Center
  • Security Operations
  • ATC
  • Data Protection & Cyber Recovery
  • Endpoint Security
  • Network Security
  • Varonis
  • Applied AI
  • Cyber Range
  • Data Strategy and Architecture
  • GenAI
  • OT Security
  • Cyera

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies