John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Review: Gazing through a hacker’s lens with RiskIQ Digital Footprint

Review: Keeping the bad phish out of your network pond with Cofense Triage

Review: Keeping the bad phish out of your network pond with Cofense Triage

The tool is still evolving, but even now represents one of the most advanced defenses against phishing.

Best security software: How 9 cutting-edge tools tackle today's threats
Update

Best security software: How 9 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

Review: Protecting clouds with Cloud Defender from Alert Logic

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

Review: Intellicta brings issue tracking to compliance rules

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a...

Review: Bricata adds threat hunting to traditional IPS/IDS

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies.

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to...

How Contrast Security protects applications from the inside out

How Contrast Security protects applications from the inside out

Contrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.

Ask me anything: Insight Engines lets you talk your network into revealing threats

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point...

Review: BluVector enables machines to protect themselves

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders.

Review: Mantix4 provides threat hunting as a service

Review: Mantix4 provides threat hunting as a service

Mantix4 provides robust threat hunting tools for use by clients, but it also takes threat hunting into the software as a service (SaaS) realm, employing a team of experts to hunt on the client's behalf.

Review: Digital Guardian offers ready-to-deploy endpoint security

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

Load More