Blog
Firewall security insights, industry analysis, and product updates.
How to Audit Firewall Rules: A Step-by-Step Guide
A practical 7-step process for auditing firewall rules — from exporting configs to finding shadow rules, validating zone segmentation, and generating remediation commands.
5 Firewall Misconfigurations That Lead to Real Breaches
Most breaches exploit firewall misconfigurations, not zero-days. Five real patterns — ANY/ANY policies, exposed management, missing profiles, weak VPN crypto, and shadow rules.
FortiGate Security Audit: The 2026 Checklist
A 10-point FortiGate audit checklist covering CIS benchmarks, admin hardening, VPN crypto, security profiles, and firmware CVE exposure — with CLI commands for each check.
Skybox Shut Down? Here's Your 60-Second Alternative
Skybox Security shut down February 2025, leaving ~500 enterprises without firewall audit coverage. Here's a practical look at your options — including what we can and can't do yet.