Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

NetBeez is busy as a bee monitoring networks from an end user perspective

Traditional network monitoring primarily looks at the health and status of major net components. That's not enough to tell a story when an end user in a remote location contacts the help desk with a connectivity or application...

Pittsburgh is a vibrant ecosystem for high tech companies

Pittsburgh is a vibrant ecosystem for high tech companies

If you think Silicon Valley has a lock on all things technology, think again. Pittsburgh is nurturing and growing a new generation of technology innovators.

Software developers can test their programs for weaknesses at the SoftWare Assurance MarketPlace—and it's free

Software is absolutely pervasive in our lives today. Our world is dependent on good quality, secure code. Now software developers have free access to an extensive online facility called the SoftWare Assurance MarketPlace (SWAMP). Here...

Encrypted data in the cloud? Be sure to control your own keys

Data encryption in the cloud is an absolute requirement these days. When you talk to your service providers about encryption, be sure to specify that you want to control your own keys.

Tool scans SMB websites for malware and vulnerabilities and automates remediation

Every day, 10,000 legitimate but compromised websites are blacklisted to help prevent people from visiting them and being exploited in some way. Unknown to the owners, these websites harbor malware or participate in botnets. 6Scan...

Aorato's directory services application firewall protects Active Directory from attack and abuse

Enterprise directory services are vulnerable to attack and insider abuse. What cyber criminal would not want access to the central system that contains all identity, authentication and authorization data? Now there is a directory...

Gain visibility into threats affecting your mobile apps or websites

Companies face threats to their business via the assets they offer outside of their network firewalls—primarily websites and mobile applications. Criminals can hack websites and spoof mobile apps in order to collect customer...

FireLayers adds granular controls to SaaS applications for security and compliance

FireLayers offers granular control of SaaS apps, making it possible to define rule sets for specific users, environments, conditions and more.

Hexadite's Automated Incident Response Solution narrows the gap between detection and response

It's not uncommon for CIRT personnel to ignore various automated security alerts, largely because they don't have enough time to investigate every alert. As attacks become more frequent and threats grow more serious, the only way...

Portnox NAC offers complete control, including over BYOD and cloud

Cloud computing, mobile computing and especially BYOD are bringing a new urgency to Network Access Control (NAC). Portnox offers a solution that reduces cost and complexity so organizations can deploy NAC in every branch location for...

Ayehu extends IT automation into security automation

Ayehu is pushing its customers into the realm of security automation through integration with security systems that generate alerts that can be automatically acted upon. This reduces time-to-mitigation for numerous types of events.

Load More