Overview
Explore
Labs
Services
Events
Partners
Select a tab
35 results found
What is Cyber Vault and How Does it Relate to Cyber Resilience?
With the ongoing threat of ransomware and malware attacks, organizations utilize a cyber vault to protect the mission critical data.
Article
• May 1, 2023
An Introduction to AI Model Security
Protecting AI models and the development environment is a major challenge given the complexity of underlying big data platforms and the mathematics required to understand attacks against modern AI algorithms.
Article
• Sep 15, 2023
Integrating Splunk SOAR and Cisco Secure Network Analytics
Splunk SOAR (security orchestration, automation and response) allows a Security Operations Center (SOC) to work smarter and more efficiently by executing a series of actions for security event and case management using automated workflows.
Article
• Feb 23, 2023
Simplifying Operations with Cybersecurity Platform Consolidation
Consolidating your cybersecurity estate provides clarity for organizations seeking to strengthen their cybersecurity posture and maximize the budget. Benefits include enhanced visibility, improved threat detection and response capabilities, simplified management, and cost savings.
Article
• Aug 1, 2023
Partner POV | Understanding and Leveraging the Role of Platformization in AI-First Cybersecurity
The convergence of cybersecurity and AI is reshaping defenses and attacks alike. Platformization, integrating multiple tools into a unified system, offers a solution to manage complexity and enhance security. Palo Alto Networks' Precision AI exemplifies this approach, providing robust, automated, and contextually aware cybersecurity solutions for modern threats.
Partner Contribution
• Feb 4, 2025
F5 DDoS Protection with Intel SmartNIC
Protecting networks against volumetric Distributed Denial of Service (DDoS) attacks is challenging enough, but for software-based infrastructure the challenge is even greater. In the past stopping multi-gigabit DDoS attacks has required dedicated network security hardware, but recently WWT was asked to test a virtual DDoS solution from F5 powered by the Intel SmartNIC FPGA.
ATC Insight
• Jun 28, 2023
Partner POV | Solving for Exponential Data Growth in Next-Gen SIEM
We dive into the ability of next-gen SIEM systems to address the common problem of rapid data growth in the first blog of a new series, "What Makes Next-Gen SIEM Next-Gen?"
Partner Contribution
• Mar 1, 2025
Partner POV | Cybersecurity Platformization
Learn how Platformization from Palo Alto Networks can help simplify and modernize your security approach.
Partner Contribution
• May 21, 2024
Securing the Cloud: A Strategic Approach to Robust Cloud Security with WWT and Fortinet
Applications and data in the cloud need to be just as vigilantly protected as those that are on-premises yet with an entirely different approach.
Article
• Mar 28, 2024
Defending Healthcare Against Cyber Attacks
It's true that all businesses are at risk for cyber attack. However, few industries face the level of threat aimed at healthcare.
Article
• Jun 3, 2023
Partner POV | Developers Deserve Better: Why Wiz Code Is Built for You.
Wiz Code helps developers integrate security into their workflow, with real-time guidance from code to cloud. Reduce last-minute fixes. Build with confidence.
Partner Contribution
• Oct 28, 2024
Partner POV | Understanding the Security Operations Journey
The pathway to proactive and resilient cybersecurity
Partner Contribution
• Sep 25, 2024