John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Release the monkey! How Infection Monkey tests network security

Review: SaltStack brings SecOps to network orchestration and automation

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Review: Blue Hexagon may make you rethink perimeter security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

These three security policy management toolsets deliver orchestration and automation.

Review: vArmour flips security on its head

Review: vArmour flips security on its head

Instead of focusing on the bad guys, vArmour identifies good processes and locks them down.

Review: Threat hunting turns the tables on attackers

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

 Inside 3 top threat hunting tools

Inside 3 top threat hunting tools

Endgame, Sqrrl, Infocyte allow security pros to hunt down and kill advanced persistent threats (APT).

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks

We reviewed SafeBreach with a test network of thousands of virtual clients. There were data servers and clients, with systems configured for business groups like customer service and accounting.

Top tools for preventing data leaks

Top tools for preventing data leaks

We tested data loss prevention (DLP) tools from Comodo, Digital Guardian and Forcepoint. These products are designed to stop protected data from being shared in multiple ways, everything from e-mail attachments to printing to even...

Review: Top tools for preventing data leaks

Review: Top tools for preventing data leaks

Most security tools are focused on keeping external attackers at bay. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data...

3 top tools to fight insider threats

3 top tools to fight insider threats

We tested three products, each concentrating on a different aspect of the insider threat problem.

Review: Hot new tools to fight insider threats

Review: Hot new tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

Load More