Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Want fewer security incidents? Get your users to change their risky behaviors

Each year, companies spend more and more on IT security solutions, but they dilute their technology investments by failing to invest in security awareness training for their people. A recent Aberdeen report shows that security...

How to protect sensitive files while making them available for sharing and collaboration

Sharing files is important but risky. FinalCode has a way to encrypt files and attach usage permissions to protect confidential information in a persistent way

Prevalent tames the challenges of assessing thousands of vendors for risk

Customers are said to realize a 3x improvement in the number of assessments they can perform while reducing costs by 30-50%

Insider threats can't mask their behavior from Gurucul's risk analytics

Security solutions that analyze behavior on the network are becoming more common. Gurucul looks at an identity's behavior from multiple dimensions to pinpoint truly risky activity.

VeloCloud's SD-WAN puts packet steering on steroids to optimize performance

Branch device enables locations to use inexpensive Internet connections for rich applications like voice and video.

Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications

Tool from ManagedMethods addresses the pervasive problem of Shadow IT in the cloud

What if you could virtualize whole cloud systems?

Bracket Computing has developed a virtualization layer that changes the behavior of underlying cloud service provider building blocks to deliver enterprise-grade infrastructure as a service

Practical advice from an information security incident response consultant

Jeff Schmidt, founder and CEO of JAS Global Advisors, provides lessons learned from more than a dozen years doing incident response

Tips for involving workers in cyber security

IT might be accountable for cyber security, but every worker needs to be responsible for protecting the organization's computing resources

The Unified Compliance Framework simplifies how companies manage compliance

A new SaaS application reduces "compliance fatigue" by harmonizing controls and guiding companies on what to do

A Security Intelligence reference model to assess your security posture

While Business Intelligence helps you identify business opportunities, SI helps you do much the same thing with threat information

Load More