John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Best security software: How 25 cutting-edge tools tackle today's threats

How 3 innovative products approach network security

How 3 innovative products approach network security

The network security category is constantly evolving with the emergence of new threats and attack techniques. Here's how 3 network security products tackle the problem.

What is vulnerability management? Processes and software for prioritizing threats

What is vulnerability management? Processes and software for prioritizing threats

Organizations handle vulnerability management in various ways, from training and best-practice implementations to filtering out all but the most dangerous threats. Here's a look at some of today's more innovative solutions.

How NSS Labs' CAWS finds and fixes network threats

How NSS Labs' CAWS finds and fixes network threats

The public instance of the CAWS Continuous Security Validation Platform from NSS Labs is a valuable tool for alerting IT teams about real threats with the ability to breach their defenses. But for networks with high security needs,...

 Inside 3 top threat hunting tools

Inside 3 top threat hunting tools

Endgame, Sqrrl, Infocyte allow security pros to hunt down and kill advanced persistent threats (APT).

Top tools for preventing data leaks

Top tools for preventing data leaks

We tested data loss prevention (DLP) tools from Comodo, Digital Guardian and Forcepoint. These products are designed to stop protected data from being shared in multiple ways, everything from e-mail attachments to printing to even...

3 top tools to fight insider threats

3 top tools to fight insider threats

We tested three products, each concentrating on a different aspect of the insider threat problem.

6 super-defenses against super-user attacks

6 super-defenses against super-user attacks

Review: Privileged Identity Management from BeyondTrust, CyberArk, Lieberman Software, NetIQ, Centrify and Viewfinity.

Anti-virus shootout: 7 old-school vendors show off new tricks

Anti-virus shootout: 7 old-school vendors show off new tricks

Signature-based AV a relic?Image by ShutterstockIn an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APT), signature-based anti-virus may seem like a relic. But traditional anti-virus...

New tools can detect hidden malware

New tools can detect hidden malware

New tools can detect hidden malwareImage by ShutterstockWe tested new security appliances from Damballa, Lancope and LightCyber that are designed to detect the latest cyber-attacks by monitoring network traffic and identifying when a...

Hawkeye G battles malware so you don’t have to
Clear Choice Tests

Hawkeye G battles malware so you don’t have to

New product from Hexis Cyber Solutions automates the detection, prevention and removal of malware.

New security tools from Tenable, HP, Co3 attempt the impossible

Automated incident response promises total network security by combining threat detection, prevention and response.

Load More