47 Posts

Fran Howarth

Senior Analyst, Bloor Research

Fran Howarth is an industry analyst and writer specialising in security. She has worked within the security technology sector for more than 25 years in an advisory capacity as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include cloud security, data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations.

Written By Fran Howarth

Mark Your Calendar for the Top Security Conferences of 2018

Security conferences offer IT professionals and enthusiasts an opportunity to network with peers, learn from experts and browse emerging technologies.

In Its Fifth Year, European Cyber Security Month Shows Why Security Is a Shared Responsibility

European Cyber Security Month aims to increase awareness about cybersecurity and emphasize the message that security is a shared responsibility.

Overcoming the Skills Gap With On-the-Job Training

Organizations can address the cybersecurity skills gap by looking to tap the pool of millennials entering the information security workforce.

How IoT Data Analytics Will Give Businesses a Competitive Edge

Given the growing number of connected devices, organizations are beginning to leverage IoT data analytics to drive better decision-making.

The Sky Is the Limit: Assessing the IoT Impact on Businesses

While we cannot assess the true IoT impact on business until adoption becomes more widespread, its transformative potential is already on full display.

The Pick of 2017 Cybersecurity Conferences

These 2017 cybersecurity conferences offer educational and networking opportunities for security experts, professionals, enthusiasts and even hackers.

BYOD Risks: Should Account Lockout Be Used After Failed Logins?

For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.

Black Hat Europe 2016: Can Hacking Be Considered Entrepreneurial?

Information sharing is key to the success of the cybersecurity industry. Learn more about ethical hacking and bug bounty programs at Black Hat Europe 2016.

Malvertising: Coming to a Website Near You

Advertising enables free content. Without online advertising, many publishers would be forced to charge users through subscriptions or other methods of payment to view their content. On the flip side, it’s a way for companies to promote new...

Sabotage: The Latest Threat to the Financial/Banking Industry

Data sabotage has become a top security concern impacting the financial/banking industry as cybercriminals find ways to profit by altering financial data.