Linda Musthaler

Linda Musthaler is a principal analyst with Essential Solutions Corp., which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Survey: Digital transformation can reveal network weaknesses

A new spin on interconnects for colocation data centers

A new spin on interconnects for colocation data centers

Stateless, Inc. launches its Luxon platform that enables provisioning of network functions as microservices.

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs

Four major trends in enterprise mobility  

Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging

Encrypted data in the cloud? Be sure to control your own keys

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

Hexadite's Automated Incident Response Solution narrows the gap between detection and response

Many organizations are in desperate need of a way to respond to at least some of their alerts in an automated way in order to free up their highly skilled people to address the most serious and complex incidents. This is a role that...

Ayehu extends IT automation into security automation

This reduces time-to-mitigation for numerous types of events.

Get the application performance insight you've never had before

How often have you heard the adage, "IT must align itself to the business needs"? It's one of those buzz phrases that sounds really obvious but, in reality, might be harder to achieve than one would think. Here is some insight on a...

Improving network access security for unmanaged devices

"Lions, and tigers and bears! Oh, my!" Anyone who has ever seen The Wizard of Oz knows that's the sum of the fears of Dorothy, Scarecrow and Tin Woodsman as they head into the woods on their way to Oz. For the network security...

Lost: A $49,000 laptop computer

About fifteen years ago, my husband and his colleague had their laptop computers stolen out of a car. They were fearful of reporting the incident to their boss, largely because the laptops had cost the company about $7,000 each. A...

Data masking secures sensitive data in non-production environments

Last week's article covered the topic of protecting data in databases from the inside out. That is, watching every action involving data as it happens, and promptly halting improper actions. This week's article takes look at data...

Load More