AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Elevating Active Directory Security: A Comprehensive Approach
Cybersecurity

Elevating Active Directory Security: A Comprehensive Approach

Understanding AWS Route Table: A Practical Guide
Network Security Automation

Understanding AWS Route Table: A Practical Guide

Demystifying AWS Hub and Spoke Network Topology
Cloud Security

Demystifying AWS Hub and Spoke Network Topology

A Deep Dive into SOAR Playbooks
Network Security Automation

A Deep Dive into SOAR Playbooks: Automating Security Operations

Understanding why Zero trust is important
Cybersecurity

Understanding Why Zero Trust is Important in Today’s Cybersecurity Landscape

Understanding CIEM Security
Cybersecurity

Understanding CIEM Security: Your Key to Robust Cloud Infrastructure

Navigating Cyber Security Insurance Requirements in 2023
Cybersecurity

Navigating Cyber Security Insurance Requirements in 2023: A Comprehensive Guide

Events

The Tufinnovate World Tour 2023: Thank you Asia and Australia! Next Stop: North America.

Network Security Automation

Essential Security Operations Metrics for Effective Cybersecurity

Navigating Firewall Rules: Understanding, Configuring, and Optimizing
Firewall Best Practices

Navigating Firewall Rules: Understanding, Configuring, and Optimizing

Cybersecurity

Understanding IAM Cloud Security: Your Key to Trustworthy Cloud Environments

Cybersecurity

A Deep Dive into Automated Incident Response: Streamlining the Process for Enhanced Cybersecurity

Cybersecurity

Unmasking the Intruders: Understanding Living Off the Land (LOTL) Attacks

blog-siem
Cloud Security

The Superior Choice: SIEM over CASB for Cloud Security and How Tufin Fits Into the Equation

Events

The Tufinnovate World Tour 2023: Thank You London, Paris, and Munich for Helping us Build for the Future

Cybersecurity

Forrester: Tufin Accelerates Innovation at a 144% ROI

Cloud Security

Cloud Security Configuration Management: A Comprehensive Guide

Cybersecurity

Zero Trust vs Least Privilege: The Battle of Cybersecurity Giants