
John Breeden II
John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

5 top deception tools and how they ensnare attackers
Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

9 top SAST and DAST tools
These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

10 top fuzzing tools: Finding the weirdest application errors
Fuzzing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit.

9 video chat apps compared: Which is best for security?
Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

10 top API security testing tools
Application programming interfaces have become a favorite target for attackers. These tools and platforms (both commercial and open source) will help identify errors, vulnerabilities, and excessive permissions.

15 top open-source intelligence tools
OSINT (open-source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.

16 top endpoint protection platforms
Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.

Auth0 Signals analyzes logins to block bots
Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.

Securonix SIEM as a service has behavior analytics baked in
Organizations that want to concentrate on finding and removing threats using advanced techniques like user and device analytics would find a perfect match in the Securonix SIEM.

How Abnormal Security combats business email compromise
Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

Volterra provides protected, distributed clouds for almost any application or network
The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.