47 Posts

Fran Howarth

Senior Analyst, Bloor Research

Fran Howarth is an industry analyst and writer specialising in security. She has worked within the security technology sector for more than 25 years in an advisory capacity as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include cloud security, data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations.

Written By Fran Howarth

Retail Security: Industry Provides Rich Pickings for Cybercriminals

Retail security presents a huge challenge for organizations in the industry, but it is essential that they enact a holistic security strategy.

Retail IT Professionals Feel More Prepared for Data Breaches

A recent survey showed that retail IT professionals feel they are prepared for data breaches, though other data doesn't fully support their belief.

2016 Security Conferences: Infosecurity Europe

Infosecurity Europe will take London by storm in June, and attendees will have many opportunities to learn about the latest security trends.

CISO Forum 2016: What Is Keeping CISOs Awake at Night?

The 10th annual CISO Forum, which was held recently in London, revealed what these security leaders are most concerned about in their organizations.

Verizon’s 2016 DBIR: Humans Remain the Weakest Link

The Verizon 2016 DBIR revealed that many established attack vectors are still effective. Organizations need to embrace possible security solutions.

2016 Security Conferences: Emphasizing the Role People Play in Security

Security conferences have traditionally focused on the technology side of the industry, but more are beginning to shed light on the people involved.

What Are the Real Security Risks of the Cloud?

While there are security risks associated with cloud services, there are also ways organizations can combat these risks with best practices.

Why Is Medical Data So Difficult to Protect?

Medical data and personal information is difficult to protect, but it is possible to lock it down with the right security and monitoring tools.

The Pick of 2016 Security Conferences

There are dozens of exciting security conferences taking place across the world in 2016. Check out our top picks for the best bets of the year.

POS Malware and Loyalty Card Fraud Growing in Popularity

As shoppers head to stores during the holiday season, enterprises need to ensure they are protected from POS malware and loyalty card fraud.