AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

A Deep Dive into SOAR Playbooks
Network Security Automation

A Deep Dive into SOAR Playbooks: Automating Security Operations

Understanding why Zero trust is important
Cybersecurity

Understanding Why Zero Trust is Important in Today’s Cybersecurity Landscape

Understanding CIEM Security
Cybersecurity

Understanding CIEM Security: Your Key to Robust Cloud Infrastructure

Navigating Cyber Security Insurance Requirements in 2023
Cybersecurity

Navigating Cyber Security Insurance Requirements in 2023: A Comprehensive Guide

Events

The Tufinnovate World Tour 2023: Thank you Asia and Australia! Next Stop: North America.

Network Security Automation

Essential Security Operations Metrics for Effective Cybersecurity

Navigating Firewall Rules: Understanding, Configuring, and Optimizing
Firewall Best Practices

Navigating Firewall Rules: Understanding, Configuring, and Optimizing

Cybersecurity

Understanding IAM Cloud Security: Your Key to Trustworthy Cloud Environments

Cybersecurity

A Deep Dive into Automated Incident Response: Streamlining the Process for Enhanced Cybersecurity

Cybersecurity

Unmasking the Intruders: Understanding Living Off the Land (LOTL) Attacks

blog-siem
Cloud Security

The Superior Choice: SIEM over CASB for Cloud Security and How Tufin Fits Into the Equation

Events

The Tufinnovate World Tour 2023: Thank You London, Paris, and Munich for Helping us Build for the Future

Cybersecurity

Forrester: Tufin Accelerates Innovation at a 144% ROI

Cloud Security

Cloud Security Configuration Management: A Comprehensive Guide

Cybersecurity

Zero Trust vs Least Privilege: The Battle of Cybersecurity Giants

Cybersecurity

What is a Firewall Ruleset? How Can It Help Me?

Cybersecurity

Firewall Change Management Best Practices: A Comprehensive Guide

Cloud Security

Cloud Security Compliance: What is it and why is it so critical?