Skip to content

#Firewall

61 articles

Knowledge base Dec 6, 2025

From UTM to NGFW — The Evolution of Firewalls: What to Choose in 2026?

UTM and NGFW represent two generations of network firewalls that competed for dominance in the network security segment for years. In 2026, the boundaries between them are blurring — but choosing the right solution still matters for protecting your organization.

Knowledge base Oct 10, 2025

Cyber-Secure Local Government Grant — Funding: Why This Is a Historic Opportunity for Your Municipality

Every day you struggle with a limited budget while trying to provide services to residents and upgrade infrastructure. Cyber security, while important, often falls to the wayside due to lack of resources. What if we told you that a historic opportunity has arisen to change that? The government's

Knowledge base Oct 2, 2025

Key Elements of the Cybersecurity Ecosystem

Learn about the key elements of the cybersecurity ecosystem, including technologies, processes, and people that together protect against threats.

Knowledge Base Jul 14, 2025

What is a Firewall? Types, Operation, and Deployment Best Practices

A firewall is a device or software that controls network traffic. Learn about firewall types, how they work, and deployment best practices.

Knowledge base May 24, 2025

Purdue Model and OT Network Segmentation in Industry 4.0: How to Protect a Modern Factory

In the IT world, three years is an eternity. In the OT world, a 30-year-old concept is still the basis for designing secure networks. The Purdue model, as it is referred to, is not an outdated relic, but a timeless philosophy. In this article, we'll explain how its fundamental principles of segmenta

Knowledge base May 22, 2025

Zero Trust in OT Networks: Can the "Trust No One" Principle Work in a Factory with PLCs?

Zero Trust is a revolution in cyber security, but how do you implement the

Knowledge base May 6, 2025

Web application firewalls in the cloud: Advantages of Radware Cloud WAF

Wondering how to effectively protect web applications from threats in a cloud environment?

Knowledge base Apr 17, 2025

How to build a secure and efficient computer network in a company? Guide

A stable and secure computer network is the foundation of a modern company. Find out how to plan and implement optimal IT solutions step by step.

Knowledge base Mar 31, 2025

Exploit - What It Is, Common Targets, Dangers, and How to Protect Against It

Learn what an exploit is, its types, typical targets, and how to effectively protect against this threat.

Knowledge base Mar 26, 2025

What Is Sniffing - How It Works and How to Defend Against It

Learn what sniffing is, how it works, and what defense techniques will help protect your data from interception.

Knowledge base Mar 13, 2025

FortiGate NGFW: Next-Generation Network Protection

Discover the advanced features of FortiGate NGFW that provide comprehensive network protection, ZTNA integration, and AI/ML-based scalability.

Knowledge base Dec 22, 2024

E-commerce security: How to protect your online store from attacks and build customer trust?

Every transaction in your online store is a transfer of not only money, but also trust. One security incident, such as the theft of payment card data, can irreparably damage your reputation and your entire business. In the competitive world of e-commerce, cyber security is not a cost, it's the found

Baza wiedzy Oct 26, 2024

How to Deploy WAF for an Online Store — A Practical Guide

A Web Application Firewall is the first line of defense for an online store. Learn how to choose, configure, and maintain a WAF for your e-commerce platform.

Knowledge base Aug 14, 2024

Hardening IT infrastructure: How to seal the foundation of your digital fortress.

Every device and system in your company, straight

Knowledge base Jul 30, 2024

Security Culture and Employee Awareness: How to Turn People into the First Line of Defense

You can have the most powerful firewalls and antivirus systems, but the final line of defense between your company and a cyberattack is always a human being. The biggest intrusions start with one careless click. So how do you transform your employees from your biggest risk to your strongest element

Knowledge base Jul 21, 2024

Indicators of compromise (IoC) vs. anomalies: How to detect attacks at an early stage?

Detecting cyber attacks is like detective work. Sometimes you find concrete evidence of a crime - fingerprints or tools (IoC indicators). Sometimes, however, you have to notice something that just

Knowledge base Jul 11, 2024

IDS/IPS systems: Why is a firewall alone not enough to protect your network?

Imagine that your firewall is a gatekeeper at the gate that only checks if the visitor has an invitation (IP address, port). But it doesn't look into his suitcase. IDS/IPS systems are additional protection that sift through the contents of that suitcase, looking for hidden weapons - exploits, viruse

Knowledge base Jun 30, 2024

SIEM from the ground up: what is it and why is it a key component of threat detection?

Every device in your company - from the firewall to the employee's laptop - generates thousands of logs a day. It's digital noise in which traces of real attacks are hidden. A SIEM system is the central nervous system of your security that collects this data, makes sense of it and allows you to spot

Knowledge base Jun 13, 2024

Zero-day threats: how to defend against unknown vulnerabilities?

Imagine a castle whose walls seem impregnable, but there is a secret passage inside, unknown to anyone. A zero-day attack exploits just such a hidden software vulnerability - a vulnerability that not even the manufacturer knows about. Before official defenses are in place, cybercriminals have an ope

Knowledge base Jun 8, 2024

Smart Grid security: How to protect power grids in the digital age?

The modern power grid (Smart Grid) is a complex nervous system, connecting power plants, transformer stations and millions of smart meters. This digital transformation increases efficiency, but at the same time opens the door to cyber attacks that can result in a massive blackout. Protecting this cr

Knowledge base May 31, 2024

Physical penetration testing: How to check if your office and server room are resistant to physical intrusion?

You invest in the most expensive firewalls, but what if an attacker can simply enter your server room by impersonating a service technician? Physical penetration testing is the ultimate test that verifies that your digital fortress doesn't have weak physical walls, doors and guards.

Knowledge base May 21, 2024

OT Cybersecurity Myths: Is a Firewall Enough? 5 Myths About Security

Many myths - half-truths and outdated beliefs that give a false sense of security - still circulate in conversations about production network security.

Knowledge base May 16, 2024

Cyber Secure Local Government is coming to an end. How to ensure the sustainability of the project and build the long-term resilience of the local government?

Imagine this moment 24 months from now: the grant project has been successfully completed and settled. New systems have been implemented, employees have been trained. Is this the end of the work? Absolutely not. This is the moment when the real test begins - the test of sustainability. In this artic

Knowledge base Apr 27, 2024

NIS2 and competencies in cybersecurity: What roles and skills are key?

The NIS2 directive forces companies to build cyber security teams. Learn the key roles and skills identified by ENISA to meet the new requirements.

Knowledge base Apr 23, 2024

OT Vulnerability Management: Legacy Systems — My PLC Controller Can't Be Updated

Your IT department sends you an urgent alert about a critical vulnerability in your SCADA system with a recommendation to

Knowledge base Apr 5, 2024

Post-Grant Cybersecurity Plan for Water Utilities: How to Build a Digitally Resilient Water System?

Congratulations! Your application has been successful. Your company's account will soon receive 1.3 million zlotys from the

Knowledge base Mar 9, 2024

LegalTech and Artificial Intelligence: Revolution in Law Firm Work

Artificial intelligence is entering the world of law, automating tedious tasks and allowing lawyers to focus on strategy. From analyzing contracts in minutes to patent process support – AI doesn't replace the lawyer but becomes their most powerful tool.

Knowledge base Feb 29, 2024

What exactly is the "Cyber Safe Water Supply" program?

The cost of upgrading cybersecurity in OT infrastructure is often an insurmountable barrier. But what if we told you that there is a program that can finance 100% of your investment, offering up to PLN 1.3 million in grants? The

Knowledge base Feb 25, 2024

What is Brute Force and how to protect against brute force attacks?

The Brute Force attack is a simple but still dangerous method of cracking passwords. Our guide explains how it works, what targets it attacks, and how to implement a multi-layered defense (MFA, account locking) to protect your business with nFlo.

Knowledge base Feb 4, 2024

What is a TOR network and how to protect a company from the dangers associated with it?

The TOR network, often associated with anonymity and the

Knowledge base Jan 26, 2024

How does penetration testing strengthen the trust of customers and business partners?

In business, trust is everything. One security breach can destroy a reputation built up over years. So how do you prove to customers and partners that their data is safe? In this article, we show that penetration testing is not just a technical verification, but a powerful marketing and business too

Knowledge base Jan 9, 2024

What Is Security Awareness and Why Is Employee Education the Foundation of Cybersecurity?

You may have the most powerful firewalls and antivirus systems, but the ultimate line of defense between your company and a cyberattack is always a human. The biggest breaches start with one careless click. So how do you transform employees from the biggest risk into the strongest element of defense?

Knowledge base Jan 8, 2024

Vulnerability prioritization in practice

Learn how to effectively prioritize vulnerabilities, focusing on the real risk to your organization. Learn methods for assessing and managing vulnerabilities.

Knowledge base Dec 17, 2023

Social Engineering Tests: Employee Resilience — Are They an Unwitting Gateway for Cybercriminals?

Learn how social engineering tests help identify weaknesses in security procedures and make employees more resilient to attacks.

Knowledge base Dec 10, 2023

Cyber risk management: How does penetration testing fit into a company's strategy?

How does penetration testing support cyber risk management?

Knowledge base Dec 6, 2023

Radware AppWall: Web Application Protection Mechanisms

How to effectively protect web applications from advanced threats?

Knowledge base Nov 27, 2023

How does the SIEM system work and what benefits does it provide to companies?

Every device in your company - from the firewall to the employee's laptop - generates thousands of logs a day. It's digital noise in which traces of real attacks are hidden. A SIEM system is the central nervous system of your security that collects this data, makes sense of it and allows you to spot

Knowledge base Nov 25, 2023

FortiGate Cloud-Native Firewall - Cloud security and a new paradigm in firewalls

Wondering how to effectively secure your cloud infrastructure?

Knowledge base Nov 14, 2023

Social engineering testing as part of comprehensive nFlo penetration testing

Discover how social engineering tests help identify human factor vulnerabilities in an organization and strengthen information security.

Knowledge base Nov 13, 2023

Simplified web application security: Key features of FortiWeb

Wondering how to effectively secure web applications? FortiWeb is a solution that simplifies the protection of web applications by providing advanced security features and easy integration.

Knowledge base Nov 11, 2023

Next-generation firewalls: How FortiGate protects your network

Wondering how modern FortiGate firewalls can make your network more secure?

Knowledge base Nov 1, 2023

Virtual firewalls with FortiGate VM: Implementation tips and tricks

Wondering how to effectively deploy FortiGate VM virtual firewalls?

Knowledge base Oct 25, 2023

Security Awareness Training for Local Government: How to Train Officials Using Grant Funds

You did it! The funding application for the 'Cybersecure Local Government' program has been submitted, and you're now planning to purchase modern systems to protect your office. But what about the most important element of this puzzle - people? The best technology is powerless when an official unknowingly clicks on a phishing link.

Knowledge base Oct 10, 2023

LAN and WAN: Build a secure and efficient IT infrastructure. A complete guide for your business

LAN or WAN? Learn the key differences between these networks, their uses, and best practices for configuration and management in your company.

Knowledge base Sep 22, 2023

What is Starlink and how to use it securely in a company's infrastructure?

Starlink is revolutionizing high-speed Internet access in places where it was previously impossible. For many companies, this represents a huge opportunity, but also new technological and security challenges. This guide is a complete compendium of knowledge for IT managers and directors. Step by ste

Knowledge base Aug 21, 2023

Communication During Penetration Tests: How to Collaborate with Clients

Even the best pentest can be wasted by poor communication. Learn how to build an effective collaboration model, when and what to report, and how to manage expectations.

Knowledge base Aug 6, 2023

Cyber-Secure Local Government Grant Application: How to Effectively Prepare Documentation

You have made a strategic decision - your local government will apply for funds from the

Knowledge base Aug 5, 2023

How to check if a phone is hacked? Guide

Learn how to recognize if your phone has been hacked, and learn the steps to help you regain the security of your device.

Knowledge base Jul 8, 2023

What is HIPS (Host-based Intrusion Prevention System)? How It Works

Learn what HIPS (Host-Based Intrusion Prevention System) is, how it works, and why it is an important element of IT system protection.

Knowledge base Jul 3, 2023

What is a WAF (Web Application Firewall) and how does it work?

Learn what a Web Application Firewall (WAF) is, how it works and how it helps protect web applications from cyber threats.

Knowledge base Jun 13, 2023

Cyberbullying — Types, Consequences, and Defense: What It Is and How to Protect Yourself

Learn about the types of cyberbullying, its effects, and discover how to effectively defend against this threat in the digital world.

Knowledge base Jun 4, 2023

CompTIA Security+ - Exam Preparation and How to Pass

Discover how to effectively prepare for the CompTIA Security+ exam and increase your chances of success. Learn which study materials to choose, how to plan your learning, and what strategies to use during the exam.

Knowledge base Jun 3, 2023

What Is Nmap and How Does It Work?

Learn what Nmap is, how it works, and why it's one of the most important tools for network scanning and security audits.

Knowledge base May 21, 2023

What is Spear Phishing - How It Works, How to Protect Yourself, and How It Differs from Phishing

Learn what spear phishing is, how to defend against this targeted threat, and the differences between it and other forms of phishing.

Knowledge base May 8, 2023

What is a Honeypot? How it Works and How to Protect Yourself? Everything You Need to Know

A honeypot is a tool used to detect cyberattacks. Learn how it works and how to protect yourself against potential threats.

Knowledge base May 4, 2023

What is FortiGate? Technologies, Operation, Scalability, and Benefits

FortiGate is an advanced firewall solution providing scalable network protection and data security for businesses.

Knowledge base Apr 28, 2023

What is SIEM - Security Information and Event Management? Definition, Components, Benefits and Challenges

SIEM is a security information and event management system that helps detect threats and respond to them in real-time.

Knowledge base Apr 17, 2023

What Is the Cybersecure Municipality Program? Everything You Need to Know

Learn how the Cybersecure Municipality program supports local governments in protection against digital threats. Key information about funding.

Knowledge base Apr 2, 2023

IT Infrastructure Security - Key to Protecting Modern Organizations

Discover key aspects of IT infrastructure security in protecting modern organizations. Learn about the latest practices and technologies in cybersecurity.

Knowledge base Mar 22, 2023

12 Tips to Improve Cybersecurity in Your Organization

Discover 12 tips for improving cybersecurity in your organization. This nFlo article presents key steps and strategies to enhance data and system protection.

Knowledge base Mar 21, 2023

Dell PowerStore Prime 4.0: Breakthrough in IT Infrastructure

Dell PowerStore Prime 4.0 is a storage solution that revolutionizes IT infrastructure with high performance, scalability, and cost efficiency.