Security
Security Insights
Filter by Content Types
- No options
1202 results found
SentinelOne CTF: Siren Song
SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console.
In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment.
While the lab environment remains open for 8 hours, the game is designed to be completed within a 6-hour window.
Primary tools utilized within the game:
🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Jun 11, 2026 • 9am
Cisco AI Defense CTF
Join us for Cisco AI Defense, an interactive Capture the Flag (CTF) experience designed to showcase how Cisco is securing the future of GenAI.
This is a single player CTF, which will be open for 72 hours. We will have a shared scoreboard. Should players finish with equal scores, final placement will be awarded to the player who achieved their last correct submission in the least amount of time from their first submission.
Powered by our advanced Cyber Range platform, this immersive simulation challenges participants to exploit and defend against real-world AI vulnerabilities — including prompt injection, jailbreaking, and misuse of generative models. You'll see firsthand how Cisco's AI Defense identifies and mitigates these threats in real time.
Experience
•Jun 1, 2026 • 9am
ARMOR up with WWT... because AI is inside the wire
Security for AI represents an unprecedented challenge, but AI security practices are compounding the problem by slowing adoption, limiting utilization, and undermining the return on your AI investments. Learn how the "WWT ARMOR framrework" — developed with leading organizations and industry partners — can accelerate AI efforts, increase utilization, and unlock productivity to drive maximum value, all while enhancing security and governance.
*Lunch & Harbor Court Parking Validation Provided
Experience
•May 28, 2026 • 4pm
ARGUS: A Framework for Autonomous Blue Team Operations
ARGUS - Autonomous Response and Guardian Unified System - is a framework for autonomous blue team operations in the age of agentic threats. It applies Toyota's Jidoka philosophy to enterprise security: machines detect and contain at machine speed, humans investigate and remediate with full context. Built for the SOC that can no longer afford to move at human speed.
Blog
•May 13, 2026
Secure the Use of GenAI Models with Cisco Secure Access
Cisco Secure Access serves as an integrated platform that provides the necessary infrastructure for organizations to govern and protect their artificial intelligence usage through centralized policy management. By embedding AI Access capabilities directly into the solution, it allows businesses to maintain robust security, visibility, and data protection while fostering innovation across the enterprise.
Video
•1:33
•May 13, 2026
Mythos Is Coming. Are You Building Walls or Traps?
Anthropic's forthcoming Mythos model wasn't built to hack. It just learned how — and it's good at it. In this AI Proving Ground Podcast episode, former NSA cybersecurity director Rob Joyce and WWT cyber leader Kent Noyes break down what Mythos means for your security posture and what the defender's playbook looks like now.
Video
•5:07
•May 13, 2026
IBM Think 2026: AI and Quantum Are Converging Infrastructure
From Arvind Krishna's CEO AMA to the quantum keynote and a packed Partner Day, IBM Think 2026 made a clear case that enterprise computing is entering a structural shift.
News
•May 13, 2026
NERC CIP-15 Compliance: A Strategic Approach for Internal Network Security Monitoring
Learn what NERC CIP-015 requires, why OT environments complicate compliance and how utilities can meet the standard while building a stronger security posture.
Article
•May 12, 2026
Hybrid Private Access with Cisco Secure Access
Cisco Secure Access provides a unified zero-trust platform that enables organizations to maintain consistent security policies across both cloud and on-premises environments. By integrating Hybrid Private Access, the platform allows IT teams to flexibly balance cloud-based scalability with local enforcement to meet specific privacy, compliance, and performance requirements.
Video
•1:23
•May 11, 2026
I Built a C2 Channel in 5 Minutes. Your Security Team Had No Idea.
A covert AI agent experiment reveals a new threat class, exploiting trusted SaaS APIs like Slack for command-and-control without detection. As autonomous agents become standard, enterprises must adopt proactive security measures. WWT's AI Gateway and Governance Framework offers a structured approach to mitigate these emerging risks.
Blog
•May 11, 2026
Defending at the Speed of AI
A 12-point response plan for cybersecurity and resilience leaders
WWT Research
•May 8, 2026
WWT - Mythos Response Framework
Join WWT for this webinar event around Mythos readiness content developed with security leaders across the sector — a prescriptive framework.
Mythos-class AI capabilities have moved a working assumption most vulnerability programs still rely on: that exploit development is slow enough for weekly or monthly patch cycles to keep pace. Median time-to-exploit is now measured in hours, and the barrier to weaponizing published CVEs has collapsed.
Rather than add to the noise, we've distilled the best public guidance into a 12-point response framework structured around three shifts: strengthen the foundation, move from vulnerability management to exploit prevention, and align people and partners.
Webinar link:
https://er-wwt.webex.com/er-wwt/j.php?MTID=m5df93c3a9932ead47d16ca4501b9e62f
Webinar number:
2550 700 1561
Webinar password:
QpGWYBy83s3
Experience
•May 7, 2026 • 3:30pm