Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Encrypted data in the cloud? Be sure to control your own keys

Data encryption in the cloud is an absolute requirement these days. When you talk to your service providers about encryption, be sure to specify that you want to control your own keys.

Tool scans SMB websites for malware and vulnerabilities and automates remediation

Every day, 10,000 legitimate but compromised websites are blacklisted to help prevent people from visiting them and being exploited in some way. Unknown to the owners, these websites harbor malware or participate in botnets. 6Scan...

Aorato's directory services application firewall protects Active Directory from attack and abuse

Enterprise directory services are vulnerable to attack and insider abuse. What cyber criminal would not want access to the central system that contains all identity, authentication and authorization data? Now there is a directory...

Gain visibility into threats affecting your mobile apps or websites

Companies face threats to their business via the assets they offer outside of their network firewalls—primarily websites and mobile applications. Criminals can hack websites and spoof mobile apps in order to collect customer...

FireLayers adds granular controls to SaaS applications for security and compliance

FireLayers offers granular control of SaaS apps, making it possible to define rule sets for specific users, environments, conditions and more.

Hexadite's Automated Incident Response Solution narrows the gap between detection and response

It's not uncommon for CIRT personnel to ignore various automated security alerts, largely because they don't have enough time to investigate every alert. As attacks become more frequent and threats grow more serious, the only way...

Portnox NAC offers complete control, including over BYOD and cloud

Cloud computing, mobile computing and especially BYOD are bringing a new urgency to Network Access Control (NAC). Portnox offers a solution that reduces cost and complexity so organizations can deploy NAC in every branch location for...

Ayehu extends IT automation into security automation

Ayehu is pushing its customers into the realm of security automation through integration with security systems that generate alerts that can be automatically acted upon. This reduces time-to-mitigation for numerous types of events.

Best practices for firewall management

Year after year, the Verizon Data Breach Investigations Report shows that device misconfigurations are a leading source of vulnerabilities that open the door to data breaches. With that in mind, here are some best practices for...

Cyphort provides guidance on prioritizing APTs for mitigation

Cyphort has announced a next generation threat defense system said to prevent and detect threats and help prioritize the highest risks so infosec professionals know how to focus their resources.

Three best practices for reducing the risk of SQL injection attacks

A federal indictment against a cybercrime ring indicates that some of the most prominent credit card breaches of 2007 stemmed from the use of SQL injection attacks. Here are three best practices to reduce your exposure.

Load More