Get the Latest News
All blog posts

Firewall Change Management for MSPs: Multi-Tenant Control and Compliance
Your client's auditor wants a complete record of every firewall rule change made in the last 12 months across all…

PCI DSS v4.0 Firewall Requirements: What Changed
Your QSA just asked for the documented business justification for every active rule on your perimeter firewall, including the temporary…

What Firewall Change Management Really Means
A junior engineer opens a ticket at 4:47 PM on a Friday: "Allow inbound 3389 from 10.42.0.0/16 to the DMZ…

Network Security Audit: What Enterprise IT Actually Checks
The auditor's first request is always the same: "Can you show me your firewall change log for the last 90…

Firewall Compliance 101
Firewalls are the first line of defense for most networks. But deploying a firewall is not the same as being…

The Hidden Cost of Firewall Sprawl
The Hidden Cost of Firewall Sprawl Every firewall your organization adds was added for a good reason. A new office…

Why Most Organizations Are Flying Blind in Azure (And Don’t Know It Yet)
Azure cloud environments are growing faster than most organizations can govern them. Without centralized visibility into resource inventory, configuration changes,…

CyberX Beta Features for Fortinet Partners
Introduction Fortinet partners know the daily grind. Managing dozens (or hundreds) of client firewalls means dealing with operational tasks that…

CyberX Introduces Three New AI-Powered Firewall Governance Tools
Introduction Firewall management has always demanded precision, patience, and an enormous amount of manual effort. Security teams spend countless hours…

How Automated Change Notifications and Audit Documentation End the Forensic Scramble
A firewall change request gets submitted. Days pass. The requester doesn't know if anyone's reviewed it. The approver doesn't know…

Why Unauthorized Firewall Changes Are a Visibility Crisis
The Myth of the Static Network There is a fundamental disconnect in how most organizations view their network security posture. …

CISOs Need Dashboards, Not Spreadsheets: Modernizing Firewall Governance
Why Spreadsheets Are Failing Cybersecurity Leaders It’s 2025, and yet many CISOs still live inside spreadsheets. Rows, columns, and color-coded…