Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.


Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications

Tool from ManagedMethods addresses the pervasive problem of Shadow IT in the cloud

What if you could virtualize whole cloud systems?

Bracket Computing has developed a virtualization layer that changes the behavior of underlying cloud service provider building blocks to deliver enterprise-grade infrastructure as a service

Practical advice from an information security incident response consultant

Jeff Schmidt, founder and CEO of JAS Global Advisors, provides lessons learned from more than a dozen years doing incident response

Tips for involving workers in cyber security

IT might be accountable for cyber security, but every worker needs to be responsible for protecting the organization's computing resources

The Unified Compliance Framework simplifies how companies manage compliance

A new SaaS application reduces "compliance fatigue" by harmonizing controls and guiding companies on what to do

A Security Intelligence reference model to assess your security posture

While Business Intelligence helps you identify business opportunities, SI helps you do much the same thing with threat information

Tracks Inspector simplifies digital evidence collection and analysis for law enforcement

Most online crimes leave digital evidence. Tracks Inspector aids non-technical investigators in collection and analysis

Is it time to adopt a military-style approach to cyber security?

While data breaches happen regularly to commercial businesses, we don't often hear about them striking the U.S. military branches or security agencies.

DreamHost report shows common types of government requests for information

Concerned the government might subpoena you to access data in the cloud? A new report shows most companies have little reason to worry

Containment security solutions for endpoints effectively stop attacks before harm is done

The way to protect PCs is to isolate untrusted tasks. BufferZone and Bromium offer interesting solutions

Tips for getting more value from your SIEM

Tips for getting more value from your SIEM

Security information and event management (SIEM) solutions need customization and continuous updating. The CEO of the MSSP Proficio provides his seasoned advice on how to get the most value from a SIEM

Load More