AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Tufin Resources
Networking Trends

Reflections on Recent Executive Advisory Boards and User Group Events: A Journey of Collaboration and Innovation

Uncategorized

The Timeline of Cybersecurity: Why Organizations Need to Find Better Ways to Mitigate Risk

Tech Partners

Unlocking your Hybrid-Network with Tufin’s Open Policy Model

Tufin Blog: Enhancing AWS Route Tables for High Availability and Disaster Recovery
Cybersecurity

Enhancing AWS Route Tables for High Availability and Disaster Recovery

Tufin Blog: Removing Firewall Audit Pain to Reach the Unreachable Network Performance Star
Firewall Best Practices

Removing Firewall Audit Pain to Reach the Unreachable Network Performance Star

Tufin Blog: It’s *Not* Complicated: Making Security Policy Management Simple
Cybersecurity

It’s *Not* Complicated: Making Security Policy Management Simple

Tufin Resources
Firewall Best Practices

Choose Your Own Network Adventure: SecureTrack+, SecureChange+, or Enterprise?

Tufin Blog: NIS2 Security Regulations Went Into Effect October 17: What You Need to Know
Cybersecurity

NIS2 Security Regulations Went Into Effect October 17: What You Need to Know

Tufin Blog: Cybersecurity Awareness Month 2024: Three Elements to Incorporate When Securing Your World
Cybersecurity

Cybersecurity Awareness Month 2024: Three Elements to Incorporate When Securing Your World

Tufin Blog: Next-Generation Firewall Review: Enhancing Network Security
Cybersecurity

Next-Generation Firewall Review: Enhancing Network Security

Tufin Blog: North-South or East-West? How to Best Filter Your Firewall Traffic
Cybersecurity

North-South or East-West? How to Best Filter Your Firewall Traffic

Tufin Blog: Web Application Firewall Best Practices
Cybersecurity

Web Application Firewall Best Practices

Tufin Blog: A Firewall Is Born: Your Firewall Deployment Checklist
Firewall Best Practices

A Firewall Is Born: Your Firewall Deployment Checklist

Tufin Blog: Cloud vs On-Premises: Here’s What You Need to Know
Cloud Security

Cloud vs On-Premises: Here’s What You Need to Know

Tufin Blog: Understanding Open Source Firewalls
Cybersecurity

Understanding Open Source Firewalls

Tufin Blog: FortiGate Firewall Audit for Enhanced Cybersecurity
Cybersecurity

FortiGate Firewall Audit for Enhanced Cybersecurity

Tufin Blog: PCI Firewall Review Checklist: Pro Tips and Common Pitfalls
Firewall Best Practices

PCI Firewall Review Checklist: Pro Tips and Common Pitfalls

Tufin Blog: CIS Firewall Hardening: Best Practices and Guidelines
Cybersecurity

CIS Firewall Hardening: Best Practices and Guidelines