Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.


Ayehu extends IT automation into security automation

Ayehu is pushing its customers into the realm of security automation through integration with security systems that generate alerts that can be automatically acted upon. This reduces time-to-mitigation for numerous types of events.

Best practices for firewall management

Year after year, the Verizon Data Breach Investigations Report shows that device misconfigurations are a leading source of vulnerabilities that open the door to data breaches. With that in mind, here are some best practices for...

Cyphort provides guidance on prioritizing APTs for mitigation

Cyphort has announced a next generation threat defense system said to prevent and detect threats and help prioritize the highest risks so infosec professionals know how to focus their resources.

Three best practices for reducing the risk of SQL injection attacks

A federal indictment against a cybercrime ring indicates that some of the most prominent credit card breaches of 2007 stemmed from the use of SQL injection attacks. Here are three best practices to reduce your exposure.

CloudPassage adds important security functions to virtualized environments

Borrowing a paradigm from botnets, CloudPassage puts a small agent on virtualized servers so they can accept command-and-control communications to add important security functions. This security automation platform can instantly add...

ManageEngine offers an alternative to complex, expensive IT management suites

Small businesses can’t afford the complex solutions from the traditional vendors of IT and systems management suites, but ManageEngine offers an interesting range of management products targeted at the SMB market that can be deployed...

Identity and access management for 10 million users? No sweat!

The state of North Carolina is undertaking a massive initiative to put all of its school districts – more than 250 of them – on one IT infrastructure in the cloud. A foundational service for this infrastructure is an all-encompassing...

Pwnie Express makes vulnerability scanning of remote sites as simple as plug-and-play

Companies with multiple branches often find it challenging to discover remote security vulnerabilities. Pwnie Express offers all-in-one solutions designed to help you do remote asset discovery, vulnerability scanning and penetration...

Malcovery provides explicit intelligence so you can block today’s top threats as they emerge

Cyber attacks are so prolific today that you need every bit of intelligence available to make your security analysts and your security devices more effective. Malcovery Security offers a service that provides details about the top...

ISACA introduces Cybersecurity Nexus program to help fill the infosec skills gap

You may know ISACA as an organization for information governance, control, security and audit professionals. The membership organization is well known for its COBIT business framework for the governance and management of enterprise...

Sookasa mitigates compliance risk of file sharing cloud services

Personal email systems and file synchronization and sharing tools like Dropbox and Gmail have become prevalent, but have inherent risks in the business world. The Compliance-as-a-Service vendor Sokasa provides a self-service turnkey...

Load More