AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Unlocking the Power of Azure Network Security Groups
Firewall Best Practices

Unlocking the Power of Azure Network Security Groups

Understanding and Mitigating MOVEit Vulnerabilities
Cybersecurity

Understanding and Mitigating MOVEit Vulnerabilities

Demystifying Firewall Configuration
Cybersecurity

Demystifying Firewall Configuration: An Essential Guide

Amplifying MSSP Capabilities with SOAR in Cybersecurity
Cybersecurity

Amplifying MSSP Capabilities with SOAR: Navigating the Cybersecurity Landscape

Elevating Active Directory Security: A Comprehensive Approach
Cybersecurity

Elevating Active Directory Security: A Comprehensive Approach

Understanding AWS Route Table: A Practical Guide
Network Security Automation

Understanding AWS Route Table: A Practical Guide

Demystifying AWS Hub and Spoke Network Topology
Cloud Security

Demystifying AWS Hub and Spoke Network Topology

A Deep Dive into SOAR Playbooks
Network Security Automation

A Deep Dive into SOAR Playbooks: Automating Security Operations

Understanding why Zero trust is important
Cybersecurity

Understanding Why Zero Trust is Important in Today’s Cybersecurity Landscape

Understanding CIEM Security
Cybersecurity

Understanding CIEM Security: Your Key to Robust Cloud Infrastructure

Navigating Cyber Security Insurance Requirements in 2023
Cybersecurity

Navigating Cyber Security Insurance Requirements in 2023: A Comprehensive Guide

Events

The Tufinnovate World Tour 2023: Thank you Asia and Australia! Next Stop: North America.

Network Security Automation

Essential Security Operations Metrics for Effective Cybersecurity

Navigating Firewall Rules: Understanding, Configuring, and Optimizing
Firewall Best Practices

Navigating Firewall Rules: Understanding, Configuring, and Optimizing

Cybersecurity

Understanding IAM Cloud Security: Your Key to Trustworthy Cloud Environments

Cybersecurity

A Deep Dive into Automated Incident Response: Streamlining the Process for Enhanced Cybersecurity

Cybersecurity

Unmasking the Intruders: Understanding Living Off the Land (LOTL) Attacks

blog-siem
Cloud Security

The Superior Choice: SIEM over CASB for Cloud Security and How Tufin Fits Into the Equation