

Linda Musthaler
Linda Musthaler is a principal analyst with Essential Solutions Corp., which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.


Mist’s wireless network lets companies personalize the user experience
Mist Systems solves the problem of personalizing a user’s experience while they are connected to a wireless network and improves user engagement.

Apcela advises how to build a hybrid IT platform for better performance and stronger security
WAN architectures today are not optimized to handle hybrid applications. Mark Casey, president and CEO of Apcela, advises on how to build a new cloud-ready architecture to improve the security and performance of hybrid applications.

Skyport Systems plugs the agility, security gaps of hybrid cloud
Skyport Systems’ SkySecure Hybrid Cloud Edge securely runs application gateways at the network edge, providing agility and security for apps in the cloud and the data center.

Area 1 Security stops phishing campaigns before they become attacks
Area 1 Security scours the web to find signs of brewing phishing campaigns in order to stop them before they can become actual attacks.
VeloCloud launches an SD-WAN security ecosystem
The company's rich security ecosystem provides security on the network and in the cloud
Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience
For online businesses, fraud is a serious and growing problem that rule-based systems can no longer address. Machine learning is instrumental in detecting and stopping fraud in real-time, without causing an impact to the user...
Forget signatures for malware detection. SparkCognition says AI is 99% effective
The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence
Silver Peak enhances its SD-WAN edge device to improve the branch experience
The goal is more granular Internet breakout for better application performance and tighter security
CyberX assesses industrial environments for cyber risks, provides continuous monitoring
As plants integrate their large-scale physical processes with IT systems for data analytics, it increases the plant’s cyberattack surface, creating a need to continuously monitor the operational environment for threats.
SaferVPN says it takes the risk out of using public Wi-Fi connections
SaferVPN’s cloud-based VPN automatically establishes a secure connection to take the risk out of using public Wi-Fi
SS8’s time machine is designed to automate the hunt for compromises
Company says it can detect and predict where breaches are coming from without the need for human intervention
A cybersecurity risk assessment is a critical part of M&A due diligence
As corporate boards get more deeply involved in understanding their own company’s cybersecurity posture, it stands to reason they would want to know similar information about an acquisition target.
How to achieve security via whitelisting with Docker containers
Twistlock has developed techniques that effectively provide whitelisting to Docker containers
How to assess security automation tools
Understanding the differences between the tools that promise to ease your security workload
CyberTech conference showcases cybersecurity solutions originating in Israel
Israel is developing cybersecurity expertise and solutions as a leading export. The recent CyberTech conference in Tel Aviv showcased both products and talent that are making an impact
TechDemocracy aims to provide a holistic assessment of cyber risk
The company’s platform measures the effectiveness of existing tools and offers a consolidated view
As Baby Boomers retire, the shortage of mainframe professionals grows more acute
People who started their careers when the mainframe was king are retiring in droves, yet this computing platform is still vital to many businesses

Secdo automates alert investigation with preemptive incident response
The company says its platform cuts incident response time by correlating alerts with endpoint forensic data, instantly revealing the attack chain, root cause, entities involved and damage assessment
Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help
Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs