top of page
Skybox customers looking for a new solution? We’ve got you covered.


Asher Benbenisty
Oct 29, 20238 min read
20 Firewall Management Best Practices for Network Security
Firewalls are one of the most important cybersecurity solutions in the enterprise tech stack. They can also be the most demanding....
18
0


Asher Benbenisty
Oct 25, 202313 min read
The Application Migration Checklist
All organizations eventually inherit outdated technology infrastructure. As new technology becomes available, old apps and services...
4
0


Asher Benbenisty
Oct 25, 20239 min read
5 Types of Firewalls for Enhanced Network Security
Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They...
6
0


Kyle Wickert
Aug 9, 20237 min read
How to fix misconfigured firewalls (and prevent firewall breaches)
Firewall misconfigurations are one of the most common and preventable security issues that organizations face. Comprehensively managing...
3
0


Prof. Avishai Wool
Aug 9, 20236 min read
Security group architecture for AWS: How to overcome security group limits
As with all cloud vendors, AWS users share responsibility for securing their infrastructure against risk. Amazon provides the tools you...
0
0

Tsippi Dach
Apr 16, 20213 min read
The importance of bridging NetOps and SecOps in network management
Tsippi Dach, Director of Communications at AlgoSec, explores the relationship between NetOps and SecOps and explains why they are the...
0
0

Amir Erel
Feb 3, 20202 min read
AlgoSec and ServiceNow: Managing Network Security Policies and Processes Within ServiceNow
AlgoSec’s Integration with ServiceNow allows AlgoSec users to automate security change management and accelerate application deployments...
4
0


Joanne Godfrey
Aug 10, 20152 min read
4 tips to manage your external network connections
Last week our CTO, Professor Avishai Wool, presented a technical webinar on the do’s and don’ts for managing external connectivity to and...
1
0


Kevin Beaver
Jul 16, 20152 min read
Top 10 common firewall threats and vulnerabilities
Common Firewall Threats Do you really know what vulnerabilities currently exist in your enterprise firewalls? Your vulnerability scans...
5
0


Matthew Pascucci
Jun 30, 20153 min read
How to Use Decoy Deception for Network Protection
A Decoy Network The strategy behind Sun Tzu’s ‘Art of War’ has been used by the military, sports teams, and pretty much anyone looking...
0
0


Kevin Beaver
Sep 23, 20142 min read
Are VLANs secure? VLAN security best practices
Virtual Local Area Network (VLAN) Security Issues You’re in no doubt familiar with Virtual Local Area Network (VLAN) technology and its...
6
0


Matthew Pascucci
Jul 15, 20143 min read
Removing insecure protocols In networks
Insecure Service Protocols and Ports Okay, we all have them… they’re everyone’s dirty little network security secrets that we try not to...
1
0


Prof. Avishai Wool
Nov 26, 20132 min read
To NAT or not to NAT – It’s not really a question
NAT Network Security I came across some discussions regarding Network Address Translation (NAT) and its impact on security and the...
0
0


Matthew Pascucci
Nov 12, 20133 min read
How to secure your LAN (Local Area Network)
How to Secure Your Local Area Network In my last blog series we reviewed ways to protect the perimeter of your network and then we took...
2
0


Kyle Wickert
Jun 25, 20133 min read
Cloud Security: Current Status, Trends and Tips
Cloud security is one of the big buzzwords in the security space along with big data and others. So we’ll try to tackle where cloud...
0
0
bottom of page