44 Posts

Fran Howarth

Senior Analyst, Bloor Research

Fran Howarth is an industry analyst and writer specialising in security. She has worked within the security technology sector for more than 25 years in an advisory capacity as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include cloud security, data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations.

Written By Fran Howarth

CISO Forum 2016: What Is Keeping CISOs Awake at Night?

The 10th annual CISO Forum, which was held recently in London, revealed what these security leaders are most concerned about in their organizations.

Verizon’s 2016 DBIR: Humans Remain the Weakest Link

The Verizon 2016 DBIR revealed that many established attack vectors are still effective. Organizations need to embrace possible security solutions.

2016 Security Conferences: Emphasizing the Role People Play in Security

Security conferences have traditionally focused on the technology side of the industry, but more are beginning to shed light on the people involved.

What Are the Real Security Risks of the Cloud?

While there are security risks associated with cloud services, there are also ways organizations can combat these risks with best practices.

Why Is Medical Data So Difficult to Protect?

Medical data and personal information is difficult to protect, but it is possible to lock it down with the right security and monitoring tools.

The Pick of 2016 Security Conferences

There are dozens of exciting security conferences taking place across the world in 2016. Check out our top picks for the best bets of the year.

POS Malware and Loyalty Card Fraud Growing in Popularity

As shoppers head to stores during the holiday season, enterprises need to ensure they are protected from POS malware and loyalty card fraud.

What Are the Risks of Legacy Infrastructure?

Using legacy infrastructure does more than drive up the costs of maintenance; it also hinders innovation and increases risks related to security.

Your Evolving Digital Life: The Need for More Secure Authentication

Biometrics and more secure types of authentication may be the next stage of digital security, designed to keep up with rapidly advancing technologies.

Top Five Tips for Creating a Culture of Security Awareness at Work

Security expert Mike Saurbaugh detailed five of his top tips for implementing an effective and sustainable security awareness program in an organization.