Michela Menting
Recent Posts
What Does Quantum-Safe Really Mean for HSM Vendors? Vendor Playbook for Internal and External PQC Support
Nov 18, 2025 11:01:22 AM / by Michela Menting posted in Quantum Safe Technologies
Cybersecurity Companies to Watch in 2026: Analyst Reflections from it-sa Expo&Congress
Oct 20, 2025 10:23:20 AM / by Michela Menting posted in Citizen Digital Identity, Trusted Device Solutions, Quantum Safe Technologies, Cybersecurity
6 Questions Every Cybersecurity Vendor Should Ask About PQC Standards for 2026
Oct 14, 2025 11:13:01 AM / by Michela Menting posted in Quantum Safe Technologies
Building a Cloud Security Strategy: ABI Research's Best Practices
Apr 3, 2025 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies
Cloud computing is a staple in today’s business environment, enabling companies to leverage Large Language Models (LLMs), store customer data, and scale their tech stack. Developing a robust cloud security strategy has emerged as a key concern. Most enterprises are still sluggish to make the shift to cloud-based ecosystems.
Compliance Issues for Cloud-Based Data
Oct 26, 2023 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies
Placing data in a third-party cloud can bring with it all kinds of new security issues. But just as importantly, there are aspects of regulatory compliance that enterprises need to address as well, and these can be highly challenging depending on the nature of the data and the location of the cloud infrastructure.
Data Security Challenges in the Cloud
Oct 10, 2023 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies
With an increasing amount of corporate data residing in the cloud, enterprises must wrestle with new security challenges daily. These are not always easy to navigate and are dependent on any number of variables, reflective of context that can be either directly related to enterprises (e.g., line of business, supply chain) or totally out of their control (e.g., socio-political events). The priority for enterprises is the security of their data in cloud environments that are hosted and run by third parties. Regarding this, two contingencies come into play.
Which Security Solutions Are Being Used to Curb the IoT Cyber Risk?
Sep 14, 2023 12:00:00 AM / by Michela Menting
Across every sector, organizations are digitally transforming to meet customer demand, increase productivity, compensate for labor shortages, create safer work environments, and build smarter cities. This digital transformation requires wider-spread use of Internet of Things (IoT) hardware, sensors, platforms, and services, with ABI Research forecasting that there will be 40.77 billion IoT connections worldwide by 2027. However, embracing IoT devices poses an elevated cyber risk due to more network entry points to target. When it comes to addressing the growing IoT cyberthreat, three primary security solutions are prioritized by enterprises and governments: Trusted Platform Modules (TPMs), Trusted Execution Environments (TEEs), and secure Microcontroller Units (MCUs).
Gearing You up for the Post-Quantum Era
Jun 23, 2023 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies
Post-Quantum Cryptography (PQC) solutions are a must-have cybersecurity tool for organizations to safeguard against attacks from large-scale quantum computers.
Camera Masking in Urban Surveillance: Two Approaches to Choose From
Apr 4, 2023 12:00:00 AM / by Michela Menting posted in Smart Urban Infrastructure
Urban surveillance is crucial for public health monitoring, public safety, and solving crimes. However, security cameras can easily pick up irrelevant information in the motion video feed, causing false alarms and a host of privacy concerns. A vital security tool used for safeguarding these sensitive data is privacy masking.
Governance, Response, and Recovery: A Closer Look at 3 Immature Security Solutions in Industrial Applications
Aug 2, 2022 12:00:00 AM / by Michela Menting posted in Industrial & Manufacturing Technologies, OT Cybersecurity
In the age of Industry 4.0 and digital transformation, the need for effective security solutions in industrial environments is made more apparent. As a result, cybersecurity spending for critical infrastructure will reach roughly US$126 billion by the end of the year, with Information Technology (IT) being the leading use case. While critical infrastructure—defense, energy, health, transport, etc.—has been the main adopter of industrial cybersecurity solutions, more sectors will begin to invest in security in an ever-connected world. There are seven areas of focus when it comes to solutions: