<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Todd Humphreys

WEI's Cybersecurity GTM Leader, Todd has led GTM initiatives for the world’s largest cybersecurity leaders, including 11 years at WEI’s longtime partner, Palo Alto Networks. With over 30 years as an IT professional, Humphreys has helped pioneer cybersecurity solutions such as intrusion detection, wireless security, next generation firewalls, and XDR solutions.
Find me on :

Posts by Todd Humphreys

Why Offensive Cybersecurity Is Now a CISO’s Best Defense

By Todd Humphreys |   Jun 05, 2025

Cybersecurity has long focused on prevention...building strong perimeters, patching systems, and monitoring for alerts. But in today’s environment of distributed networks, hybrid architectures, and AI-powered adversaries, traditional defense models are falling short. 

What’s Next for Firewall Policy Management in the Age of SASE?

By Todd Humphreys |   May 29, 2025

For years, firewall policy management has burdened enterprise IT and security teams with manual audits, inconsistent rules, and a high risk of misconfigurations. Today, this legacy model no longer meets the needs of modern digital enterprises. 

Penetration Testing Done Right: How to Find the Right Fit and Partner

By Todd Humphreys |   May 22, 2025

Modern enterprises are built on interconnected infrastructure — hybrid networks, cloud workloads, remote users, and SaaS sprawl. But as environments grow more distributed, the likelihood of undetected vulnerabilities and lateral movement paths increases.

Zero-Day vs. One-Day Vulnerabilities: An Executive’s Guide to Cyber Resilience

By Todd Humphreys |   May 15, 2025

Zero-day and one-day vulnerabilities are no longer rare technical anomalies. They are active threats leveraged daily by cybercriminals and nation-state actors alike. For IT executives and the teams they lead, protecting the enterprise requires more than patch management or reactive measures. It demands a proactive, intelligence-driven strategy that anticipates threats before they strike.

SASE In Practice: 7 Scenarios Where It Beats Traditional Approaches

By Todd Humphreys |   Feb 27, 2025

Secure Access Service Edge (SASE) represents a fundamental shift in how businesses protect and connect their digital operations. As organizations accelerate their digital initiatives and cloud adoption, traditional network and security approaches like MPLS and traditional WANs are proving inadequate for today's dynamic business needs in the era of the cloud. Below are seven use cases that demonstrate how SASE delivers strategic advantages over conventional networking and security approaches.

Weighing Your Options: SD-WAN Renewal or SASE Adoption?

By Todd Humphreys |   Feb 25, 2025

Technology is constantly evolving, just like the business landscape it supports. This evolution may have prompted your organization to transition to SD-WAN years ago, as it offered significant advantages over MPLS at the time. However, with the rapid pace of innovation, it’s worth asking: Is SD-WAN still the right investment, or is it time to embrace the next generation of technology?

Build Your Cybersecurity Talent Pipeline With WEI's Technical Apprenticeship For Diverse Candidates

By Todd Humphreys |   Sep 05, 2024

Today’s fast-paced demands of cybersecurity require a workforce that is both highly skilled and diverse. However, many large and medium enterprises face ongoing challenges in attracting and retaining cyber talent. Economic uncertainties have led to hiring slowdowns and cutbacks, despite the rising need for cybersecurity due to increasing threats. Key skills in demand include programming, threat analysis, and cloud security, with soft skills like communication also being crucial. Upskilling and internal training are highlighted as strategies to address workforce gaps.

Why The Enterprise Browser Is Key To A Strong Cybersecurity Strategy

By Todd Humphreys |   Aug 20, 2024

The Internet browser has become an indispensable tool in the modern workplace – even outperforming other commonly used software like Microsoft Office or the CRM apps commonly found in corporate settings. However, traditional browsers weren’t designed with enterprise needs in mind; they were built for consumers, focusing on shopping, streaming, and social media. This challenge forces IT teams to develop a browser cybersecurity strategy, resulting in a complex, fragile, and costly environment that often frustrates users with delays and disruptions.

The Evolution of Cybersecurity Threats: Lessons from the Frontlines

By Todd Humphreys |   Jul 30, 2024

Cybersecurity has become one of the most critical aspects of modern business operations, especially for IT executives tasked with safeguarding their organization's digital assets. As cyber threats evolve in complexity and scale, understanding their progression and learning from past incidents is crucial for building resilient defenses. The insights shared during WEI’s recent Cyber Warfare & Beyond event provide IT security leaders a valuable perspective on the major cybersecurity incidents of our time and how they have shaped current strategies.

Cybersecurity And The Geopolitical Landscape: What IT Security Leaders Need To Know

By Todd Humphreys |   Jul 11, 2024

Today’s interconnected world means cybersecurity is no longer a concern that is confined to just the realm of IT departments and tech companies. It has become a critical aspect of global geopolitics, influencing international relations, national security, and economic stability. For IT security leaders at medium and large enterprises, understanding the geopolitical implications of cybersecurity is an important component to developing a resilient cyber strategy.

About WEI

WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

Subscribe to WEI's Tech Exchange Blog


Categories

see all
Contact Us