top of page
Skybox customers looking for a new solution? We’ve got you covered.


20 Firewall Management Best Practices for Network Security
Firewalls are one of the most important cybersecurity solutions in the enterprise tech stack. They can also be the most demanding....

Asher Benbenisty
Oct 29, 20238 min read
51
0


The Application Migration Checklist
All organizations eventually inherit outdated technology infrastructure. As new technology becomes available, old apps and services...

Asher Benbenisty
Oct 25, 202313 min read
5
0


5 Types of Firewalls for Enhanced Network Security
Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They...

Asher Benbenisty
Oct 25, 20239 min read
10
0


How to fix misconfigured firewalls (and prevent firewall breaches)
Firewall misconfigurations are one of the most common and preventable security issues that organizations face. Comprehensively managing...

Kyle Wickert
Aug 9, 20237 min read
6
0


Security group architecture for AWS: How to overcome security group limits
As with all cloud vendors, AWS users share responsibility for securing their infrastructure against risk. Amazon provides the tools you...

Prof. Avishai Wool
Aug 9, 20236 min read
5
0


The importance of bridging NetOps and SecOps in network management
Tsippi Dach, Director of Communications at AlgoSec, explores the relationship between NetOps and SecOps and explains why they are the...

Tsippi Dach
Apr 16, 20213 min read
0
0


AlgoSec and ServiceNow: Managing Network Security Policies and Processes Within ServiceNow
AlgoSec’s Integration with ServiceNow allows AlgoSec users to automate security change management and accelerate application deployments...

Amir Erel
Feb 3, 20202 min read
9
0


4 tips to manage your external network connections
Last week our CTO, Professor Avishai Wool, presented a technical webinar on the do’s and don’ts for managing external connectivity to and...

Joanne Godfrey
Aug 10, 20152 min read
6
0


Top 10 common firewall threats and vulnerabilities
Common Firewall Threats Do you really know what vulnerabilities currently exist in your enterprise firewalls? Your vulnerability scans...

Kevin Beaver
Jul 16, 20152 min read
8
0


How to Use Decoy Deception for Network Protection
A Decoy Network The strategy behind Sun Tzu’s ‘Art of War’ has been used by the military, sports teams, and pretty much anyone looking...
Matthew Pascucci
Jun 30, 20153 min read
0
0


Are VLANs secure? VLAN security best practices
Virtual Local Area Network (VLAN) Security Issues You’re in no doubt familiar with Virtual Local Area Network (VLAN) technology and its...

Kevin Beaver
Sep 23, 20142 min read
14
0


Removing insecure protocols In networks
Insecure Service Protocols and Ports Okay, we all have them… they’re everyone’s dirty little network security secrets that we try not to...
Matthew Pascucci
Jul 15, 20143 min read
5
0


To NAT or not to NAT – It’s not really a question
NAT Network Security I came across some discussions regarding Network Address Translation (NAT) and its impact on security and the...

Prof. Avishai Wool
Nov 26, 20132 min read
7
0


How to secure your LAN (Local Area Network)
How to Secure Your Local Area Network In my last blog series we reviewed ways to protect the perimeter of your network and then we took...
Matthew Pascucci
Nov 12, 20133 min read
12
0


Cloud Security: Current Status, Trends and Tips
Cloud security is one of the big buzzwords in the security space along with big data and others. So we’ll try to tackle where cloud...

Kyle Wickert
Jun 25, 20133 min read
0
0
bottom of page