Security
Security Insights
Filter by Content Types
- No options
906 results found
AI Essentials
Welcome to the AI Essentials Learning Series. This series is designed to equip you with the knowledge and skills necessary to understand key aspects of Artificial Intelligence (AI). As AI continues to revolutionize industries and transform the way we live and work, it is crucial to understand the fundamental components that enable its remarkable performance. This series of learning paths will provide you with a comprehensive overview of AI, High Performance Storage, High Performance Networking, High Performance Compute, and Security, all tailored to the specific needs of AI applications.
Learning Series
Palo Alto Networks Next-Generation Firewall (NGFW)
Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path
Security Operations
This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series
Next-Generation Firewall (NGFW)
This learning series will explore Next-Generation Firewalls (NGFW), which are advanced network security devices that combine traditional firewall capabilities with additional features such as intrusion prevention, application awareness and control, and advanced threat protection. These firewalls go beyond the capabilities of traditional firewalls by providing deeper inspection of network traffic and more granular control over applications and user activities.
Learning Series
Cyber Range Red Team Tools
In this learning series, you will familiarize yourself with the basics of some of the key tools you may need during a Cyber Range red team event. A red team in cybersecurity is responsible for finding weaknesses and vulnerabilities inside a system and exploiting them for educational purposes. This learning series will teach you the fundamentals of network reconnaissance, password cracking, and exploitation tools.
Learning Series
LLM Security
In this learning path, you will gain a fundamental understanding of Large Language Model (LLM) security. Through a series of articles and videos you will explore topics like what is an LLM, data security risks, the OWASP Top 10 for LLMs, strategies for defending LLM systems, and the critical role users play in maintaining security.
Learning Path
AI Security
In this learning path you will gain a fundamental understanding of AI security by exploring topics such as the AI development lifecycle, data flow during this lifecycle, as well as attack surfaces present in the AI development lifecycle. You will also learn about topics such as the attacks that AI models face and the risks of user data and privacy when it comes to AI.
Learning Path
Security Priorities for 2025
In this report, our security experts outline four key areas to focus on in 2025
WWT Research
• Jan 1, 2025
Data Center Priorities for 2025
A roadmap for what to prioritize in the data center space.
WWT Research
• Jan 1, 2025
Key Trends for Media, Gaming and Entertainment
This article aims to inform, inspire and guide the MEG industry on how to leverage the latest technologies to create immersive experiences, achieve business outcomes and stay ahead of the competition.
Article
• May 9, 2024
Adopt a Hacker Mentality to Stay Ahead of the Cyber Curve | Experts
Today's threat landscape is broader than ever and cyberattacks are growing in volume and sophistication each and every day. In fact, hackers are launching new assaults at a clip of greater than one every minute of the day. Yet an alarming number of business leaders feel ill-prepared in the event a cyberattack hits their company. How can this be given the stakes involved?
Join WWT Cyber Range Architect Brett Turner as he discusses what cyber threats pose the greatest risks to organizations this year and how companies can best address the expanding talent gap taking place in the cyber industry. Brett also talks about what it takes to become an ethical hacker and why dynamic, live-fire cyber exercises called Cyber Ranges could be your best bet to standing up to cyber criminals moving forward.
Video
• 0:17
• Dec 17, 2024
Networking Priorities for 2025
An actionable roadmap for focusing your networking initiatives.
WWT Research
• Jan 1, 2025