Security
Security Insights
Filter by Content Types
- No options
1153 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Nov 20, 2025 • 10am
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Nov 13, 2025 • 9am
🚩Disarm Me CTF: Hack, Decrypt, Disable
This red team–style CTF puts your team in the role of attackers breaking into an emulated internal network. You'll play as contracted gray-hat operatives (SAVE) infiltrating The League — a shadowy collective behind ransomware and extortion campaigns — to recover intelligence and disrupt their plans.
Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights.
What you'll practice:
🔍 Attacker tradecraft — reconnaissance, exploitation, persistence.
🧠 Adversary tool fluency — exposure to real-world tools and methods.
🤝 Critical thinking & communication — operate as a focused squad under timed pressure.
🗂️ Side quests & extra intelligence — optional objectives that surface richer findings for your organization.
Cyber Range
•Nov 6, 2025 • 9am
CrowdStrike CTF: Falcon
THIS EVENT IS FULL. THERE IS ANOTHER CROWDSTRIKE CTF on 11/20/25 https://www.wwt.com/event/68d1aa3809339a9dd017002b
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Oct 29, 2025 • 10am
WWT Innovation Vendor Spotlight - Chainguard
The next WWT Innovation Vendor Spotlight will feature a discussion with Chainguard. This webinar will provide an overview of the WWT AppSec Practice and include a conversation with Chainguard regarding their approach to software security.
Chainguard provides hardened, secure, and production-ready builds for open source software used in development and deployment processes. The company works with Fortune 500 enterprises and various global organizations such as Anduril, Canva, Fortinet, Hewlett Packard Enterprise, Snap Inc., and Snowflake. Chainguard is supported by investors including Amplify, IVP, Kleiner Perkins, Lightspeed Venture Partners, Mantis VC, Redpoint Ventures, Sequoia Capital, and Spark Capital. Further information can be found at:
https://www.chainguard.dev/
Agenda:
* Introductions (5 Min)
* WWT Application Security Practice (10 Min)
* Chainguard Overview (30–45 Min)
* Q&A (15 Min)
When:
October 22nd, 2025
11:30am EST – 1:00pm EST
Experience
•Oct 22, 2025 • 10:30am
Streamlining service desk support for a global insurance provider
WWT helped a leading insurance provider unify its support operations across global teams, streamline vendor contracts and deliver a culturally aligned service experience that improved responsiveness and enhanced operational efficiency.
Case Study
Collaboration in Cyberspace with Madison Horn
Safeguarding critical infrastructure demands more than just technology— it requires unity.
News
•Oct 16, 2025
Data Security Use Cases and Emerging Trends
This learning path covers data security strategies, real-world use cases, and emerging trends shaping the future of data & cyber security. This learning path also covers foundational principles, advanced threat mitigation, & the various data protection technologies.
Learning Path
Cloud, FinOps and AI: What You Need to Know About Unit Economics, GPUs and the ROI Flywheel
AI has pushed cloud into overdrive. In this episode of the AI Proving Ground Podcast, two of our top cloud experts — Jack French and Todd Barron — reset the approach and detail why cloud is the launchpad but portability is the strategy; how to start greenfield with containers and abstraction; what a real FinOps model for AI looks like (unit economics, tagging, token/GPU visibility); where neo clouds fit versus hyperscalers; and how to handle cross-cloud risk and skill gaps; and the governance moves that accelerate—not restrict—innovation.
Video
•1:38
•Oct 14, 2025
Partner POV | AI Security 101: Mapping the AI Attack Surface
AI is reshaping software development, introducing complex security challenges. This article explores the AI attack surface, highlighting risks like prompt injection and data leakage. It emphasizes the need for cross-functional collaboration and innovative tools like Wiz to manage AI risks effectively, ensuring secure and agile AI adoption in cloud environments.
Partner Contribution
•Oct 14, 2025
Partner POV | Fortinet + Armis Security Solution
Armis Centrix™ and Fortinet's collaboration offers unparalleled visibility and control over managed and unmanaged devices, enhancing security through AI-driven insights. This joint solution simplifies threat detection and response, optimizes security resources, and supports zero trust, ensuring robust protection across diverse environments without disrupting operations. Discover a new era of cybersecurity management.
Partner Contribution
•Oct 14, 2025
Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication
Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025