Overview
Explore
Events
Select a tab
30 results found
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
• Aug 7, 2023
Leading the AI Revolution: Key Takeaways from the First Ai day
Discover the key insights from WWT's inaugural Ai day event in Dallas, where experts delved into practical AI applications, enterprise data strategies, and the balance of innovation and security in AI deployment.
Blog
• Oct 28, 2024
Black Hat 2024: Community, AI and resilience
WWT cybersecurity experts share their insights and reflections on Black Hat 2024, the world's premier cyber event.
Blog
• Aug 15, 2024
Fortinet SD-WAN Success Will Innovate FortiSASE
For the fifth consecutive year, Fortinet has been recognized as a Leader in Secure SD-WAN. But can they apply the same rigor and discipline that earned them this leadership position in the SASE space? WWT believes they can, and here's why.
Blog
• Oct 21, 2024
Empowering Safe AI Adoption with Palo Alto Networks' AI Access Security
Palo Alto Networks' AI Access Security offers a comprehensive solution for managing and securing generative AI applications. It provides real-time visibility, granular access controls and advanced data protection, enabling organizations to harness AI's potential while minimizing risks of data leakage and unauthorized access. Embrace AI responsibly with AI Access Security.
Blog
• Nov 15, 2024
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
• May 1, 2023
Combating Insurance Fraud with AI: Enhancing Detection Capabilities and Mitigating Risks
By analyzing large amounts of data to identify patterns and anomalies indicative of fraud, AI-powered fraud detection systems can improve efficiency and revolutionize customer experiences in the insurance industry.
Blog
• Jun 7, 2024
AI Matters: Hammers & Nails
This blog discusses the excitement and potential of using AI to solve complex problems in cyber operations, while cautioning that responsible AI is neither easy nor cheap. The author shares observations and approaches to consider when evaluating AI's effectiveness and potential pitfalls.
Blog
• Sep 16, 2024
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
• May 6, 2024
Black Hat 2024 Recap: A Look Ahead to a More Secure Future
This blog is a summary of thoughts and takeaways from both BlackHat and DEFCON in early August 2024.
Blog
• Sep 5, 2024
Securing AI in Real-Time with Palo Alto Networks' AI Runtime Security
As AI adoption grows, so do the risks. Palo Alto Networks' AI Runtime Security offers real-time monitoring, advanced threat detection and zero-trust access controls to protect AI applications. This solution ensures data security, regulatory compliance and operational integrity, enabling businesses to confidently leverage AI's potential while mitigating vulnerabilities.
Blog
• Nov 19, 2024
Predictive AI with Palo Alto Networks
AI can be used for both enhancing and attacking cybersecurity. Learn how Palo Alto Networks is leading the way in implementing AI solutions across its product line.
Blog
• May 14, 2024