AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Firewall Best Practices

Top Firewall Features to Secure Your Network

Firewall Best Practices

Firewall Topology Best Practices: Elevating Your Network Security

Firewall Best Practices

Inbound vs Outbound Firewall Rules: Simplifying Network Security

Cybersecurity

Maximize Your Tufin Investment with Prisma Access Automation

Elevating Active Directory Security: A Comprehensive Approach
Firewall Best Practices

Firewall Configurations Demystified: Navigating the Types and Best Practices

Regulations and Compliance

Cisco Network Audit Checklist: Navigating Security and Compliance with Ease

Uncategorized

Navigating Cloud Security Metrics: A Guide for CISOs

Exploring Firewall Design Principles: Securing Your Network
Cybersecurity

How to Implement Zero Trust: A Strategic Approach for Security

Embracing Industrial Network Segmentation: A Strategic Approach to Cybersecurity
Cybersecurity

Navigating the Perils of Flat Network Security Risks

Maximizing Network Security: Understanding the Internal Segmentation Firewall (ISFW)
Cybersecurity

The Role of a SOC Runbook: Streamlining SOC Operations

Tufin Resources
Cybersecurity

Unveiling Dashboard Essentials: Streamlined Security Implementation and Progress Tracking

Cybersecurity

Data Center Migration Best Practices for Modern IT Teams

Cybersecurity

Data Center Firewall Best Practices: Navigating the Complexities of Network Security

Uncategorized

Cisco ArcaneDoor Vulnerabilities: How to Defend Against CVE-2024-20353, CVE-2024-20359

Cybersecurity

4 Changes Between PCI DSS 3.2 and PCI DSS 4 You Should Be Aware Of, and How Tufin Can Help You Switch Gears

Maximizing Network Security: Understanding the Internal Segmentation Firewall (ISFW)
Firewall Best Practices

Maximizing Network Security: Understanding the Internal Segmentation Firewall (ISFW)

Unlocking the Benefits of Network Segmentation
Cybersecurity

Unlocking the Benefits of Network Segmentation: A Key to Enhanced Cybersecurity

3 Common Challenges and Solutions when Implementing Zero Trust
Uncategorized

3 Common Challenges and Solutions when Implementing Zero Trust Networking Policies