Overview
Explore
Labs
Services
Events
Partners
35 results found
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
• Aug 7, 2023
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
• Jan 23, 2023
AI Matters: Hammers & Nails
This blog discusses the excitement and potential of using AI to solve complex problems in cyber operations, while cautioning that responsible AI is neither easy nor cheap. The author shares observations and approaches to consider when evaluating AI's effectiveness and potential pitfalls.
Blog
• Sep 16, 2024
Using the ATC and Cyber Range to Upskill your Security Operations Team
Utilize the Cyber Range's CTFs and Learning Paths to help develop security teams and give your SOC a competitive edge.
Blog
• Jul 12, 2024
Fortinet SD-WAN Success Will Innovate FortiSASE
For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
• Oct 21, 2024
Palo Alto Ignite Conference Key Takeaways
A brief recap of my experience at Palo Alto's Ignite conference this year. Palo Alto demonstrated Cortex XSOAR, XDR, Xpanse and the new XSIAM.
Blog
• Jun 17, 2024
The 3 R's of Cybersecurity to Combat Insider Threats
Insider threats, now better termed "insider risks," extend beyond disgruntled employees to include careless vendors and compromised contractors. By focusing on the 3 R's of cybersecurity — risk, resilience and recovery — companies can mitigate these risks and protect their intellectual property and data from internal threats.
Blog
• Oct 21, 2024
Cybersecurity Awareness: Multi-factor Authentication (MFA)
October is Cybersecurity Awareness Month. This week, let's all be rigorous in how we're enabling multi-factor authentication.
Blog
• Oct 10, 2023
API Security Fundamentals: An Introduction (and What Does the Super Bowl Have to Do With It?)
Let's delve into all things API security, particularly aimed at global financial institutions. Here, I cover the basics and provide an overview of WWT's approach (with a Super Bowl-themed twist). Next, I'll cover API discovery; then API focused threat detection, prevention and response; and lastly, API security testing and validation.
Blog
• Jan 25, 2022
Why Should Organizations Optimize Their SOC?
To address growing cyber threats, companies must optimize their Security Operations Centers (SOCs). SOCs designed properly detect and mitigate incidents faster. SOC optimization improves security by comparing architectures, procedures, tools and teams to industry standards. Clear, timely communication and industry norms are essential. SOC optimization increases resource allocation and protects against emerging threats. Security, threat response and compliance are advantages. Automating, streamlining and communicating improve incident detection and response. Risks are reduced by SOC optimization.
Blog
• Jun 23, 2023
Fortinet Accelerate 2023 Recap
WWT's Warren Jackson recaps his time at Fortinet Accelerate 2023, held April 4-5 in Orlando, Florida.
Blog
• Apr 20, 2023
The Convergence of Security and Privacy in a Data-Driven World
Digital data growth brings opportunities and risks. Organizations realize the importance of a complete data asset inventory for security and privacy decision-making. Due to digital blurring, data security and privacy are merging. Interoperability is prioritized over replacing security systems. Organizations struggle to manage and secure dark and unstructured data. Noncompliance with privacy laws now carries heavy fines. Organizations must prioritize automated deep data discovery, consent management, data minimization, and DSAR compliance. Modern digital success requires privacy by design.
Blog
• Jun 23, 2023