John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Securonix SIEM as a service has behavior analytics baked in

How Abnormal Security combats business email compromise

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

Volterra provides protected, distributed clouds for almost any application or network

Volterra provides protected, distributed clouds for almost any application or network

The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.

ZeroNorth orchestrates and tames enterprise scanner sprawl

ZeroNorth orchestrates and tames enterprise scanner sprawl

The ZeroNorth platform makes scanners more effective and reduces cybersecurity fatigue by consolidating both scan results and fixes.

Review: Ericom Shield extends zero trust to websites with browser isolation

Review: Ericom Shield extends zero trust to websites with browser isolation

Using Docker containers, Shield allows website content in while keeping malware out.

10 Slack security tools compared

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

Review: How ShiftLeft catches vulnerabilities during code development

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.

Review: Achieving enlightened segmentation with Illumio

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.

Release the monkey! How Infection Monkey tests network security

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

8 top OSINT tools: Find sensitive public info before hackers do

8 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed.

Review: LogicHub expertly automates security

Review: LogicHub expertly automates security

It’s not only highly effective at diagnosing and countering threats, but it does so in a transparent way that is configurable and editable by users.

Review: SaltStack brings SecOps to network orchestration and automation

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Load More