top of page


Network Change Management: Best Practices for 2024
What is network change management? Network Change Management (NCM) is the process of planning, testing, and approving changes to a...

Tsippi Dach
Feb 8, 20246 min read
5
0


14 Step Checklist for a Flawless Network Security Audit
14 Step Checklist for a Flawless Network Security Audit If security policies aren’t periodically updated to meet modern threat demands,...

Tsippi Dach
Dec 20, 20238 min read
8
0


Can Firewalls Be Hacked? Yes, Here’s 6 Vulnerabilities
Can Firewalls Be Hacked? Yes, Here’s 6 Vulnerabilities Like all security tools, firewalls can be hacked. That’s what happened to the...

Tsippi Dach
Dec 20, 202310 min read
1
0


How To Reduce Attack Surface: 6 Proven Tactics
How To Reduce Attack Surface: 6 Proven Tactics Security-oriented organizations continuously identify, monitor, and manage...

Tsippi Dach
Dec 20, 20239 min read
0
0


Network segmentation vs. VLAN explained
Safeguarding the network architecture is the need of the hour. According to a study, the average cost of a data breach is at an all-time...

Tsippi Dach
Aug 9, 20236 min read
3
0


What is Network Security Policy Automation?
Security policy automation is the process of automating certain cybersecurity tasks like threat detection (ransomware, malware, security...

Tsippi Dach
Aug 9, 20236 min read
4
0


Firewall has detected a new network
If your firewall shows a notification that it has detected a new network, it means it is doing one of its fundamental jobs properly. But...

Tsippi Dach
Aug 9, 20237 min read
0
0


Firewall performance tuning: Common issues & resolutions
A firewall that runs 24/7 requires a good amount of computing resources. Especially if you are running a complex firewall system, your...

Asher Benbenisty
Aug 9, 20236 min read
9
0


How to improve network security (7 fundamental ways)
As per Cloudwards , a new organization gets hit by ransomware every 14 seconds. This is despite the fact that global cybersecurity...

Tsippi Dach
Aug 9, 20237 min read
11
0


Understanding network lifecycle management
Behind every important business process is a solid network infrastructure that lets us access all of these services. But for an efficient...

Tsippi Dach
Jul 4, 20236 min read
0
0


2023 Cybersecurity Predictions and Best Practices
As 2022 comes to a close, Professor Avishai Wool, AlgoSec Co-Founder and CTO, provides his top 5 issues organizations will need to be...

Prof. Avishai Wool
Dec 6, 20224 min read
0
0


Cybersecurity predictions and best practices in 2022
While we optimistically hoped for normality in 2021, organizations continue to deal with the repercussions of the pandemic nearly two...

Prof. Avishai Wool
Feb 8, 20225 min read
7
1
bottom of page