John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

9 API security tools on the frontlines of cybersecurity

5 top deception tools and how they ensnare attackers

5 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

10 top fuzzing tools: Finding the weirdest application errors

10 top fuzzing tools: Finding the weirdest application errors

Fuzzing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit.

9 video chat apps compared: Which is best for security?

9 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

10 top API security testing tools

10 top API security testing tools

Application programming interfaces have become a favorite target for attackers. These tools and platforms (both commercial and open source) will help identify errors, vulnerabilities, and excessive permissions.

15 top open-source intelligence tools

15 top open-source intelligence tools

OSINT (open-source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.

16 top endpoint protection platforms

16 top endpoint protection platforms

Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.

Auth0 Signals analyzes logins to block bots

Auth0 Signals analyzes logins to block bots

Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.

Securonix SIEM as a service has behavior analytics baked in

Securonix SIEM as a service has behavior analytics baked in

Organizations that want to concentrate on finding and removing threats using advanced techniques like user and device analytics would find a perfect match in the Securonix SIEM.

How Abnormal Security combats business email compromise

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

Volterra provides protected, distributed clouds for almost any application or network

Volterra provides protected, distributed clouds for almost any application or network

The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.

Load More