Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Are you overlooking tokenization as a data security measure?

Tokenization is another way to obscure data and protect it in the event of a breach

Real business opportunities that are only possible through SDN

See how two companies are using SDN to do what they couldn't do before

Five Ways Shadow IT in the cloud hurts your enterprise

With good intentions, workers set up accounts in various cloud services so they can be more productive in their jobs. When the IT department doesn't even know about these "shadow IT" instances, the whole organization can be hurt.

Cytegic helps enterprises assess their cybersecurity maturity level

The toolset helps enterprises get an understanding of their overall security posture and make strategic decisions about their security controls

IoT devices get a secure element to protect critical systems

In a few years the Internet of Things will link 40 billion devices, but in many cases security will be lax. Gemalto designs security in from the start

Authentic8's browser-in-a-cloud insulates users from Web-borne threats

Client-based browsers are inherently insecure. Authentic8 provides a cloud-based browser within a container to insulate enterprises from Web-borne exploits, threats and attacks

Can your network withstand the Internet of Evil Things?

The Internet of Things is here—tens of billions of devices that are Internet-connected for various business purposes. But some of those devices have a malicious purpose.

Grab your new credit card and get ready to dip your chip

Banks are issuing hundreds of millions of credit and debit cards with an embedded smart chip to combat fraud. Many experts believe the effort is too little, too late.

Attivo Networks uses active deception to trap attackers inside your network

You've heard of using honeypots to attract malicious actors. Attivo Networks expands on this concept to engage with any attacker, human or otherwise, that has found its way inside your network.

Vidder's Software Defined Perimeter puts tight security around high value assets

Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.

Twistlock adds security and vulnerability management to Docker containers

Software containers are the hottest technology in application development, but they lack inherent security and vulnerability management capabilities

Load More