Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Mist’s wireless network lets companies personalize the user experience

Apcela advises how to build a hybrid IT platform for better performance and stronger security

Apcela advises how to build a hybrid IT platform for better performance and stronger security

WAN architectures today are not optimized to handle hybrid applications. Mark Casey, president and CEO of Apcela, advises on how to build a new cloud-ready architecture to improve the security and performance of hybrid applications.

Skyport Systems plugs the agility, security gaps of hybrid cloud

Skyport Systems plugs the agility, security gaps of hybrid cloud

Skyport Systems’ SkySecure Hybrid Cloud Edge securely runs application gateways at the network edge, providing agility and security for apps in the cloud and the data center.

Area 1 Security stops phishing campaigns before they become attacks

Area 1 Security stops phishing campaigns before they become attacks

Area 1 Security scours the web to find signs of brewing phishing campaigns in order to stop them before they can become actual attacks.

VeloCloud launches an SD-WAN security ecosystem

The company's rich security ecosystem provides security on the network and in the cloud

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

For online businesses, fraud is a serious and growing problem that rule-based systems can no longer address. Machine learning is instrumental in detecting and stopping fraud in real-time, without causing an impact to the user...

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

Silver Peak enhances its SD-WAN edge device to improve the branch experience  

The goal is more granular Internet breakout for better application performance and tighter security

CyberX assesses industrial environments for cyber risks, provides continuous monitoring

As plants integrate their large-scale physical processes with IT systems for data analytics, it increases the plant’s cyberattack surface, creating a need to continuously monitor the operational environment for threats.

SaferVPN says it takes the risk out of using public Wi-Fi connections  

SaferVPN’s cloud-based VPN automatically establishes a secure connection to take the risk out of using public Wi-Fi

SS8’s time machine is designed to automate the hunt for compromises  

Company says it can detect and predict where breaches are coming from without the need for human intervention

A cybersecurity risk assessment is a critical part of M&A due diligence  

As corporate boards get more deeply involved in understanding their own company’s cybersecurity posture, it stands to reason they would want to know similar information about an acquisition target.

Load More