Overview
Explore
Services
Experts
Events
Select a tab
70 results found
The Grizzled CyberVet's Tactical Plan: Mapping Palo Alto Networks to MITRE ATT&CK
Next up in the Grizzled CyberVet series: A global enterprise faces a full-scale cyberattack spanning every stage of the MITRE ATT&CK framework. Armed with Palo Alto Networks' full security platform, they stop the threat at every turn. Learn how a unified security strategy can outmatch attackers before they succeed. Read on to see it in action!
Blog
•Mar 19, 2025
The Grizzled CyberVet: How Palo Alto Networks Powers End-to-End Cyber Defense
Fragmented security solutions create inefficiencies and vulnerabilities. This article explores how Palo Alto Networks' integrated platform addresses these gaps, breaking the cybersecurity kill chain at every stage. By consolidating security functions, organizations enhance threat prevention, streamline operations and reduce costs. Learn how a unified approach strengthens defenses and why proactive security is essential for business resilience.
Blog
•Mar 14, 2025
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
Key Takeaways from DISTRIBUTECH 2025
The flagship transmission and distribution event provided insight into how electric utilities can stay ahead of growing energy complexities.
Blog
•Apr 10, 2025
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023
From Games to Gains: the Role of Game Theory and Gamification in Cybersecurity Risk Management
Game theory and gamification are pivotal in cybersecurity, offering insights into attacker and defender behaviors and enhancing awareness and training. This beginner's guide will delve into using game theory for predictive analysis and gamification to bolster cybersecurity practices. Ideal for professionals, researchers and students, this post marks the beginning of a multi-part series aimed at solidifying the understanding of game theory and gamification's impact on digital security.
Blog
•Feb 29, 2024
The Grizzled CyberVet: State of Network Security
Network security has evolved rapidly, with the field now embracing zero trust, AI-driven defenses and integrated platforms. The next five years will see AI, SASE and quantum-resistant cryptography reshape the landscape. Enterprises must consolidate tools, adopt AI automation and prioritize identity-first security to stay ahead of increasingly sophisticated cyber threats. Secure your future now.
Blog
•Feb 18, 2025
Innovative Regulatory Compliance Solutions for the Banking Industry
Banks must address an increasing volume of compliance directives from regulators. This blog post details WWT's multifaceted approach to mitigating regulatory risks through compliance automation, preventative risk management and continuous monitoring.
Blog
•Mar 25, 2024
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
•May 6, 2024
Telecoms Security Act compliance: The challenges for service providers in 2024
Now that we've passed the first milestone for measures to be implemented, many service providers are progressing towards full TSA compliance – but are you on track to meet the 2028 deadline for completion?
Blog
•Jun 30, 2024
Understanding the Cybersecurity Kill Chain: A Simple Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the cybersecurity kill chain. We simplify and explain this model used by attackers to compromise your digital ecosystem.
Blog
•Nov 6, 2024