Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Sift Security helps SecOps teams analyze and visualize patterns of threats and speed up investigations  

How to prepare for a data breach  

The impact of a breach can be lessened if an organization is well prepared to respond quickly. The head of Experian's Data Breach Resolution group advises how

Cato Networks offers a new model for network security as a service  

With the traditional network perimeter all but gone, Cato Networks has built a new perimeter in the cloud, offering network security as a service across all entities

Demisto accelerates security investigations through automation and collaboration  

Security operations centers often suffer from alert fatigue and a chronic shortage of security experts. Demisto accelerates many of the processes of a SOC through automation and collaboration

VeloCloud's SD-WAN solution facilitates quick expansion for The Bay Club Company

When The Bay Club Company acquires a new club, it can't wait 90 days to bring the new club online. VeloCloud does the job in less than an hour.

Intralinks adds security layers for high value content collaboration using SharePoint and other systems  

The company’s cloud-based service enables collaboration among internal and external parties, even if the documents are in a SharePoint repository behind a firewall

Aqua Security focuses on securing the runtime environment of containers  

Containers can only succeed if tight security measures are integrated into the processes from development to production

LightCyber's attack detection platform distills alerts and generates actionable information  

A recent survey says organizations receive 17,000 malware alerts a week—too many to actually deal with. LightCyber boils that down to a dozen meaningful alerts

Four major trends in enterprise mobility  

Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging

Virtual environments make it easy to deploy deception technology

Attackers use deception to invade your network. Turn the tables and deceive them so the attack gets trapped and stopped

With some advanced preparation, you can survive a ransomware attack  

Ransomware is running rampant. Prepare for this type of cyber attack now for a better outcome later

Veriflow Systems applies formal verification to prevent network outages and breaches  

Networks change often to accommodate business needs. Veriflow says it has a way to verify those changes before they are made

Load More