Overview
Explore
Services
Experts
Events
59 results found
Black Hat 2024: Community, AI and resilience
WWT cybersecurity experts share their insights and reflections on Black Hat 2024, the world's premier cyber event.
Blog
• Aug 15, 2024
From Games to Gains: the Role of Game Theory and Gamification in Cybersecurity Risk Management
Game theory and gamification are pivotal in cybersecurity, offering insights into attacker and defender behaviors and enhancing awareness and training. This beginner's guide will delve into using game theory for predictive analysis and gamification to bolster cybersecurity practices. Ideal for professionals, researchers and students, this post marks the beginning of a multi-part series aimed at solidifying the understanding of game theory and gamification's impact on digital security.
Blog
• Feb 29, 2024
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
• May 1, 2023
Telecoms Security Act compliance: The challenges for service providers in 2024
Now that we've passed the first milestone for measures to be implemented, many service providers are progressing towards full TSA compliance – but are you on track to meet the 2028 deadline for completion?
Blog
• Jun 30, 2024
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
• May 6, 2024
The Impact of the Chevron Reversal - An Unclear Future for Cyber Regulation
The recent U.S. Supreme Court decision has raised questions about the impact on cybersecurity regulations. Stakeholders must navigate regulatory uncertainty and potential deregulation.
Blog
• Jul 10, 2024
Cyber Posture Management and the Evolution of Cyber Resilience
Cyber posture management is the evolution of cyber resilience. Considering traditional technology, security, AI, and the different facets of risk posed by modern cyber incidents, organizations need an enhanced understanding of risk in order to comprehensively manage it.
Blog
• Sep 6, 2024
Secure All Together – Think About "The 3 R's"
In today's digital age, it is crucial to prioritize cybersecurity and focus on the three key areas of risk, resilience and recovery. By evaluating and mitigating risks, building resilience and having a well-defined recovery plan, organizations can enhance their security and ensure business continuity. Collaboration and embracing these principles can create a safer digital world.
Blog
• Aug 8, 2024
Architecting Intelligence: Laying the Foundation of AI Security via Data Governance
AI solutions require a certain level of data governance maturity to be safe and trustworthy. Learn why data governance success extends beyond mere data management to include data quality, security, compliance and proper classification.
Blog
• Feb 6, 2024
Fortinet SD-WAN Success Will Innovate FortiSASE
For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
• Oct 21, 2024
Telecoms Security Act 2021 - The Journey to Compliance
The Telecoms Security Act requires UK telecom providers to have measures in place to identify and defend their networks from cyber threats, as well as prepare for any future risks. Learn about these regulations and how WWT can help.
Blog
• Dec 13, 2023
The 3 R's of Cybersecurity to Combat Insider Threats
Insider threats, now better termed "insider risks," extend beyond disgruntled employees to include careless vendors and compromised contractors. By focusing on the 3 R's of cybersecurity — risk, resilience and recovery — companies can mitigate these risks and protect their intellectual property and data from internal threats.
Blog
• Oct 21, 2024