AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Network Security Automation

Essential Security Operations Metrics for Effective Cybersecurity

Navigating Firewall Rules: Understanding, Configuring, and Optimizing
Firewall Best Practices

Navigating Firewall Rules: Understanding, Configuring, and Optimizing

Cybersecurity

Understanding IAM Cloud Security: Your Key to Trustworthy Cloud Environments

Cybersecurity

A Deep Dive into Automated Incident Response: Streamlining the Process for Enhanced Cybersecurity

Cybersecurity

Unmasking the Intruders: Understanding Living Off the Land (LOTL) Attacks

blog-siem
Cloud Security

The Superior Choice: SIEM over CASB for Cloud Security and How Tufin Fits Into the Equation

Events

The Tufinnovate World Tour 2023: Thank You London, Paris, and Munich for Helping us Build for the Future

Cybersecurity

Forrester: Tufin Accelerates Innovation at a 144% ROI

Cloud Security

Cloud Security Configuration Management: A Comprehensive Guide

Cybersecurity

Zero Trust vs Least Privilege: The Battle of Cybersecurity Giants

Cybersecurity

What is a Firewall Ruleset? How Can It Help Me?

Cybersecurity

Firewall Change Management Best Practices: A Comprehensive Guide

Cloud Security

Cloud Security Compliance: What is it and why is it so critical?

Cloud Security

What’s New in Tufin Orchestration Suite R23-1

ServiceNow
Network Security Automation

Accelerate Incident Triage and Response With ServiceNow

Cybersecurity

Security Announcement: TufinOS 2.x Fix for Meltdown and Spectre Vulnerabilities

Cybersecurity

2017 Predictions Part 2 – Getting Over the Gap: How Your Organization can Address the Security Skills Shortage

Cybersecurity

A Word From Ray Brancato, Tufin’s New CEO