John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Release the monkey! How Infection Monkey tests network security

Review: SaltStack brings SecOps to network orchestration and automation

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Review: Blue Hexagon may make you rethink perimeter security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

These three security policy management toolsets deliver orchestration and automation.

Review: vArmour flips security on its head

Review: vArmour flips security on its head

Instead of focusing on the bad guys, vArmour identifies good processes and locks them down.

Review: Threat hunting turns the tables on attackers

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks

We reviewed SafeBreach with a test network of thousands of virtual clients. There were data servers and clients, with systems configured for business groups like customer service and accounting.

Review: Top tools for preventing data leaks

Review: Top tools for preventing data leaks

Most security tools are focused on keeping external attackers at bay. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data...

Review: Hot new tools to fight insider threats

Review: Hot new tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

REVIEW: Cyphort makes advanced threat protection easier than ever

REVIEW: Cyphort makes advanced threat protection easier than ever

Over the past few months, we’ve reviewed a variety of cutting-edge security tools that combat advanced persistent threats (APTs); everything from threat intelligence to virtual sandboxing to privileged identity management. And while...

Review: Stop insider attacks with these 6 powerful tools

Review: Stop insider attacks with these 6 powerful tools

For this review, we looked at BeyondTrust, Lieberman Software, NetIQ, CyberArk, Centrify and Viewfinity. This is still an evolving area, and companies are approach it from different perspectives. For that reason, this is not a...

REVIEW: Threat Intelligence could turn the tide against cybercriminals

REVIEW: Threat Intelligence could turn the tide against cybercriminals

We review security products from ThreatConnect, ThreatStream, Soltra, Arbor Networks and iSIGHT Partners

Load More