AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Cybersecurity

Data Center Migration Best Practices for Modern IT Teams

Cybersecurity

Data Center Firewall Best Practices: Navigating the Complexities of Network Security

Uncategorized

Cisco ArcaneDoor Vulnerabilities: How to Defend Against CVE-2024-20353, CVE-2024-20359

Cybersecurity

4 Changes Between PCI DSS 3.2 and PCI DSS 4 You Should Be Aware Of, and How Tufin Can Help You Switch Gears

Maximizing Network Security: Understanding the Internal Segmentation Firewall (ISFW)
Firewall Best Practices

Maximizing Network Security: Understanding the Internal Segmentation Firewall (ISFW)

Unlocking the Benefits of Network Segmentation
Cybersecurity

Unlocking the Benefits of Network Segmentation: A Key to Enhanced Cybersecurity

3 Common Challenges and Solutions when Implementing Zero Trust
Uncategorized

3 Common Challenges and Solutions when Implementing Zero Trust Networking Policies

Embracing Industrial Network Segmentation: A Strategic Approach to Cybersecurity
Cybersecurity

Embracing Industrial Network Segmentation: A Strategic Approach to Cybersecurity

Navigating PCI DSS Network Segmentation: A Key to Compliance
Cybersecurity

Navigating PCI DSS Network Segmentation: A Key to Compliance

Cybersecurity

Embracing SOAR for Effective Threat Hunting

Cybersecurity

Elevating Security Operations: The SOAR Solution

Understanding the Importance of Cloud Security Controls
Cloud Security

Understanding the Importance of Cloud Security Controls

Network Segmentation vs Segregation: Balancing Security and Accessibility
Cybersecurity

Network Segmentation vs Segregation: Balancing Security and Accessibility

Tufin Blog: Firewall Design Best Practices
Cybersecurity

Exploring Firewall Design Principles: Securing Your Network

Cybersecurity

Addressing Firewall Challenges in Today’s Cyber Landscape

Zero Trust vs Micro-Segmentation: The Modern Network's Security Playbook
Cybersecurity

Zero Trust vs Micro-Segmentation: The Modern Network’s Security Playbook

WAF vs. Firewall: Unraveling the Web Application & Network Firewalls Conundrum
Cybersecurity

WAF vs. Firewall: Unraveling the Web Application & Network Firewalls Conundrum

Understanding the Application Layer Firewall: The Future of Online Security
Firewall Best Practices

Understanding the Application Layer Firewall: The Future of Online Security