46 Posts

Fran Howarth

Senior Analyst, Bloor Research

Fran Howarth is an industry analyst and writer specialising in security. She has worked within the security technology sector for more than 25 years in an advisory capacity as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include cloud security, data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations.

Written By Fran Howarth

The Stark Realities of Today’s Cyber Security Landscape

The results of IBM's "2014 Cyber Security Intelligence Index" show that the majority of organizations are more vulnerable than they think.

Is Password Protection Really Enough?

Bring-your-own-device (BYOD) is an unstoppable force, but organizations need to take a close look at security and move beyond mere password protection.

Tips and Tricks for Negotiating the Wild West That Is Black Hat

Black Hat and Defcon are notoriously lawless. If you can't be convinced to just stay home, follow these tips before heading to the conferences.

Tips and Tricks for Negotiating the Wild West That Is Black Hat

Black Hat and Defcon are notoriously lawless. If you can't be convinced to just stay home, follow these tips before heading to the conferences.

Finding the Right Balance in the Fight Against Online Fraud

A new solution from two IBM Master Inventors aims to eliminate online fraud by analyzing users' typical behavior when browsing the Web.

Identity Management in the Cloud: Top Tips for Secure Identities

With high-profile data breaches appearing increasingly often in the news, organizations must consider identity management in cloud computing services.