<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1448210&amp;fmt=gif">
Free Research
ABI Research Blog | Michela Menting

Michela Menting


Recent Posts

What Does Quantum-Safe Really Mean for HSM Vendors? Vendor Playbook for Internal and External PQC Support

Nov 18, 2025 11:01:22 AM / by Michela Menting posted in Quantum Safe Technologies

0 Comments

 

Read More

Cybersecurity Companies to Watch in 2026: Analyst Reflections from it-sa Expo&Congress

Oct 20, 2025 10:23:20 AM / by Michela Menting posted in Citizen Digital Identity, Trusted Device Solutions, Quantum Safe Technologies, Cybersecurity

0 Comments

 

Read More

6 Questions Every Cybersecurity Vendor Should Ask About PQC Standards for 2026

Oct 14, 2025 11:13:01 AM / by Michela Menting posted in Quantum Safe Technologies

0 Comments

 

Read More

Building a Cloud Security Strategy: ABI Research's Best Practices

Apr 3, 2025 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies

0 Comments

Cloud computing is a staple in today’s business environment, enabling companies to leverage Large Language Models (LLMs), store customer data, and scale their tech stack. Developing a robust cloud security strategy has emerged as a key concern. Most enterprises are still sluggish to make the shift to cloud-based ecosystems.

Read More

Compliance Issues for Cloud-Based Data

Oct 26, 2023 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies

0 Comments

Placing data in a third-party cloud can bring with it all kinds of new security issues. But just as importantly, there are aspects of regulatory compliance that enterprises need to address as well, and these can be highly challenging depending on the nature of the data and the location of the cloud infrastructure.

Read More

Data Security Challenges in the Cloud

Oct 10, 2023 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies

0 Comments

With an increasing amount of corporate data residing in the cloud, enterprises must wrestle with new security challenges daily. These are not always easy to navigate and are dependent on any number of variables, reflective of context that can be either directly related to enterprises (e.g., line of business, supply chain) or totally out of their control (e.g., socio-political events). The priority for enterprises is the security of their data in cloud environments that are hosted and run by third parties. Regarding this, two contingencies come into play.

Read More

Which Security Solutions Are Being Used to Curb the IoT Cyber Risk?

Sep 14, 2023 12:00:00 AM / by Michela Menting

0 Comments

Across every sector, organizations are digitally transforming to meet customer demand, increase productivity, compensate for labor shortages, create safer work environments, and build smarter cities. This digital transformation requires wider-spread use of Internet of Things (IoT) hardware, sensors, platforms, and services, with ABI Research forecasting that there will be 40.77 billion IoT connections worldwide by 2027. However, embracing IoT devices poses an elevated cyber risk due to more network entry points to target. When it comes to addressing the growing IoT cyberthreat, three primary security solutions are prioritized by enterprises and governments: Trusted Platform Modules (TPMs), Trusted Execution Environments (TEEs), and secure Microcontroller Units (MCUs).

Read More

Gearing You up for the Post-Quantum Era

Jun 23, 2023 12:00:00 AM / by Michela Menting posted in Quantum Safe Technologies

0 Comments

Post-Quantum Cryptography (PQC) solutions are a must-have cybersecurity tool for organizations to safeguard against attacks from large-scale quantum computers.

Read More

Camera Masking in Urban Surveillance: Two Approaches to Choose From

Apr 4, 2023 12:00:00 AM / by Michela Menting posted in Smart Urban Infrastructure

0 Comments

Urban surveillance is crucial for public health monitoring, public safety, and solving crimes. However, security cameras can easily pick up irrelevant information in the motion video feed, causing false alarms and a host of privacy concerns. A vital security tool used for safeguarding these sensitive data is privacy masking.

Read More

Governance, Response, and Recovery: A Closer Look at 3 Immature Security Solutions in Industrial Applications

Aug 2, 2022 12:00:00 AM / by Michela Menting posted in Industrial & Manufacturing Technologies, OT Cybersecurity

0 Comments

In the age of Industry 4.0 and digital transformation, the need for effective security solutions in industrial environments is made more apparent. As a result, cybersecurity spending for critical infrastructure will reach roughly US$126 billion by the end of the year, with Information Technology (IT) being the leading use case. While critical infrastructure—defense, energy, health, transport, etc.—has been the main adopter of industrial cybersecurity solutions, more sectors will begin to invest in security in an ever-connected world. There are seven areas of focus when it comes to solutions:

Read More

Lists by Topic

see all

Posts by Topic

See all

Recent Posts