AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Posts by Avigdor Book

Amplifying MSSP Capabilities with SOAR in Cybersecurity
Cybersecurity

Amplifying MSSP Capabilities with SOAR: Navigating the Cybersecurity Landscape

Elevating Active Directory Security: A Comprehensive Approach
Cybersecurity

Elevating Active Directory Security: A Comprehensive Approach

Understanding AWS Route Table: A Practical Guide
Network Security Automation

Understanding AWS Route Table: A Practical Guide

Demystifying AWS Hub and Spoke Network Topology
Cloud Security

Demystifying AWS Hub and Spoke Network Topology

A Deep Dive into SOAR Playbooks
Network Security Automation

A Deep Dive into SOAR Playbooks: Automating Security Operations

Understanding why Zero trust is important
Cybersecurity

Understanding Why Zero Trust is Important in Today’s Cybersecurity Landscape

Understanding CIEM Security
Cybersecurity

Understanding CIEM Security: Your Key to Robust Cloud Infrastructure

Navigating Cyber Security Insurance Requirements in 2023
Cybersecurity

Navigating Cyber Security Insurance Requirements in 2023: A Comprehensive Guide

Network Security Automation

Essential Security Operations Metrics for Effective Cybersecurity

Navigating Firewall Rules: Understanding, Configuring, and Optimizing
Firewall Best Practices

Navigating Firewall Rules: Understanding, Configuring, and Optimizing

Cybersecurity

Understanding IAM Cloud Security: Your Key to Trustworthy Cloud Environments

Cybersecurity

A Deep Dive into Automated Incident Response: Streamlining the Process for Enhanced Cybersecurity

Cybersecurity

Unmasking the Intruders: Understanding Living Off the Land (LOTL) Attacks

blog-siem
Cloud Security

The Superior Choice: SIEM over CASB for Cloud Security and How Tufin Fits Into the Equation

Cloud Security

Cloud Security Configuration Management: A Comprehensive Guide

Cybersecurity

Zero Trust vs Least Privilege: The Battle of Cybersecurity Giants

Cybersecurity

What is a Firewall Ruleset? How can it help me?

Cybersecurity

Firewall Change Management Best Practices: A Comprehensive Guide