Bloor Alumni
Fran Howarth specialises in the field of security, primarily information security, but with a keen interest in physical security and how the two are converging. Fran’s other main areas of interest are new delivery models, such as cloud computing, information governance, web, network and application security, identity and access management, and encryption.
Fran focuses on the business needs for security technologies, looking at the benefits they gain from their use and how organisations can defend themselves against the threats that they face in an ever-changing landscape.
For more than 20 years, Fran has worked in an advisory capacity as an analyst, consultant and writer. She writes regularly for a number of publications, including Silicon, Computer Weekly, Computer Reseller News, IT-Analysis and Computing Magazine. Fran is also a regular contributor to Security Management Practices of the Faulkner Information Services division of InfoToday.
Research from Fran Howarth
- Cybersecurity in the cloud on 19th June, 2024
- Continuous threat exposure management on 19th June, 2024
- VIAVI Solutions Observer Sentry on 12th April, 2024
- ExtraHop Reveal(x) on 26th March, 2024
- The growing imperative for data security on 19th January, 2024
- Fortra Alert Logic on 22nd December, 2023
- The need for WAFs is growing stronger on 14th November, 2023
- ExtraHop forging ahead in the NDR market on 27th October, 2023
- How vendor partnerships will benefit your business on 20th October, 2023
- Cloud-native SIEM on 29th September, 2023
- The importance of data provenance on 28th September, 2023
- Orange Cyberdefense MDR on 26th September, 2023
- Network Detection and Response (2023) on 1st August, 2023
- Expel – Security Operations Provider on 17th July, 2023
- How cybersecurity investments will benefit your business on 17th July, 2023
- Is a managed WAF service a good fit for your organisation? on 11th July, 2023
- Identity and security must go hand in hand on 18th April, 2023
- Kudelski Security’s MDR services on 6th April, 2023
- Ransomware just met its match on 24th March, 2023
- If it’s not integrated, don’t fall for it on 15th March, 2023
- Levelling the playing field with DLP for the midmarket on 22nd February, 2023
- Managed Detection and Response Services (2023) on 27th January, 2023
- The increasing burden of regulations on 14th December, 2022
- Data provisioning challenges in a changing landscape on 7th December, 2022
- The state of data analytics on 7th December, 2022
- How a zero trust approach can help to achieve effective and mutable digital transformation on 10th November, 2022
- The many flavours of threat detection and response on 15th September, 2022
- Autonomous XDR for a well-rounded defence on 31st August, 2022
- Alert Logic MDR: case studies on 10th August, 2022
- IDaaS: Identity at the heart of security on 26th May, 2022
- Network Detection and Response (2022) on 18th March, 2022
- The Promise of XDR on 18th March, 2022
- The promise of NDR on 18th March, 2022
- What is XDR? on 18th March, 2022
- Autonomous and integrated security for peace of mind on 20th January, 2022
- Human Expertise is Key to Intelligent Incident Response on 7th January, 2022
- The ABCs of cloud security on 16th December, 2021
- Disrupters in the Privilege Management Market on 23rd April, 2021
- Privilege Management on 20th April, 2021
- Privilege Management Technologies on 20th April, 2021
- Managed Detection and Response Services (2021) on 3rd February, 2021
- Cutting through the fog on 20th November, 2020
- Managed Detection and Response on 13th November, 2020
- MDR: a path to outcome-based security on 13th November, 2020
- Identity Management for the Modern Era on 26th August, 2020
- Red Teaming on 3rd July, 2020
- Outsmarting attackers: the role of threat hunting in MDR on 5th May, 2020
- The Complexity Trap on 21st April, 2020
- Skills shortages driving the need for MDR services on 16th April, 2020
- Telemetry: the vital ingredient in MDR on 9th April, 2020
- EDR vs EDR MDR on 1st April, 2020
- The importance of endpoints to security on 24th March, 2020
- What is MDR and why is it needed? on 18th March, 2020
- Managed Detection and Response Services on 4th March, 2020
- Cyber Catalyst: driving the future of cyber insurance on 6th November, 2019
- Open Cybersecurity Alliance – what is it and why is it needed? on 22nd October, 2019
- GDPR Compliance on 18th September, 2019
- AI and cybersecurity: puppies grow up to be guard dogs on 2nd August, 2019
- Who goes there? Focus on identities to reduce business risk on 31st July, 2019
- Protecting the crown jewels: focus on privileged account security on 31st May, 2019
- GRC realities on 8th February, 2019
- State of Industrial and OT Security Report 2018 on 18th December, 2018
- Endpoint detection and response on 7th December, 2018
- The ongoing evolution of SIEM on 7th December, 2018
- Security Response Orchestration on 5th December, 2018
- User and Entity Behavioural Analytics on 5th December, 2018
- Encryption on 7th November, 2018
- Security is a human problem on 20th September, 2018
- Ensuring the future of website security on 4th September, 2018
- Driving into the future with connected cars on 6th July, 2018
- Overcoming GDPR compliance challenges on 11th April, 2018
- Overcoming the complexity gap on 10th July, 2017
- Evolving uses of the kill chain framework on 10th July, 2017
- Engendering trust in an online world on 6th July, 2017
- Proactive response on 22nd November, 2016
- The importance of a data protection platform for GDPR compliance on 29th September, 2016
- The promise of managed endpoint security on 27th September, 2016
- Selling unsecure websites is not an option on 24th March, 2016
- Bit9 + Carbon Black emerges as Carbon Black on 3rd February, 2016
- How to raise your organisation’s security maturity level on 29th January, 2016
- Data protection in France on 29th January, 2016
- For the EU’s new data protection regulation, encryption should be the default option on 10th November, 2015
- Is security an inhibitor to cloud? on 27th October, 2015
- Taking control of file-sharing services on 27th October, 2015
- Turning the tables on cyber criminals on 3rd August, 2015
- Glasswall Solutions email security on 26th June, 2015
- Security industry market trends on 13th April, 2015
- AlienVault Unified Security Management System (USM) on 8th April, 2015
- Solving the complexities of SAP account and entitlement reviews on 3rd March, 2015
- Practices for Enhancing Data Security on 23rd February, 2015
- The role of trusted data in security intelligence on 13th February, 2015
- The need for active response to advanced threats on 20th November, 2014
- LogRhythm’s continued momentum on 4th November, 2014
- Solving the puzzle for actionable insight on 30th October, 2014
- Advanced threat protection and remediation on 30th October, 2014
- Defending against the rogue on 28th October, 2014
- Document Content Security V2 on 10th September, 2014
- Security intelligence: solving the puzzle for actionable insight on 8th September, 2014
- Major trends and developments in the advanced threat protection market on 4th September, 2014
- Managing the BYOD risk on 19th August, 2014
- Hexis Cyber Solutions: a new entrant to the NAC market on 18th August, 2014
- BeyondTrust MAS TRM on 11th July, 2014
- Meeting MAS Regulations on 27th May, 2014
- Good information governance is good business practice on 27th May, 2014
- Taking control of file sharing services on 25th April, 2014
- What the Bit9 + Carbon Black merger is all about on 31st March, 2014
- Document Content Security on 25th March, 2014
- A brave new (pretty scary) world on 21st March, 2014
- The perils of the privileged insider on 17th March, 2014
- Advanced Threat Protection on 10th March, 2014
- The need to protect against file-based attacks on 21st February, 2014
- New standard for simpler, stronger online authentication on 3rd February, 2014
- DDoS attacks: “the cost of doing business online” on 29th January, 2014
- FireEye acquires Mandiant for nearly US$1 billion on 6th January, 2014
- SolarWinds Log & Event Manager on 6th January, 2014
- The state of play for identity management services on 6th December, 2013
- Glasswall Solutions on 4th December, 2013
- Content assurance and advanced threat protection for valuable business documents on 20th November, 2013
- Technology evolution & its impact on security on 24th October, 2013
- Advanced cyber threat detection and response from Hexis Cyber Solutions on 14th October, 2013
- Managing indicators of compromise on 11th October, 2013
- NAC technologies morphing into network security platforms on 9th September, 2013
- CSI Tools on 19th August, 2013
- Infographic on API adoption on 5th August, 2013
- APIs: a new era in enablement on 1st August, 2013
- Heads up! Updated security standard coming…. on 25th July, 2013
- SailPoint unveils unified identity management as a service suite on 24th July, 2013
- Bit9 brings Mac users into the fold on 24th July, 2013
- Ping Identity receives $44m funding; eyes IPO on 18th July, 2013
- RSA Security acquires Aveksa on 9th July, 2013
- New strong online authentication service from CertiVox on 25th June, 2013
- Blended security threats need a unified response on 25th June, 2013
- Innovative analytics technology from LightCyber on 4th June, 2013
- Blended security threats require a unified response on 28th May, 2013
- Identity & Access Management Services on 22nd May, 2013
- McAfee publicly enters the IAM market on 7th May, 2013
- APTs: the imperative for active monitoring on 7th May, 2013
- The requirements of a security analytics platform on 2nd May, 2013
- Why the role of the CISO needs to change on 30th April, 2013
- FireMon Security Manager Platform on 20th April, 2013
- Identity management services on 26th March, 2013
- Getting ahead in the cloud on 11th March, 2013
- Harnessing big data for security on 12th February, 2013
- Key considerations for security intelligence in big data on 12th February, 2013
- The value of big data in security on 24th December, 2012
- The value of big data in security on 11th December, 2012
- Advanced threats require advanced weapons on 3rd December, 2012
- Enhancing security through a trust-based approach on 7th November, 2012
- Security proving to be a fruitful area for investment on 25th October, 2012
- How telcos can grow their business and manage risk on 21st October, 2012
- Trust as the foundation of security on 14th September, 2012
- Challenges and opportunities in the telecommunications sector on 6th September, 2012
- Security based on trust not fear on 30th August, 2012
- IPv6: where are we now? on 26th July, 2012
- People-Centric Security on 2nd May, 2012
- Essential email security on 2nd May, 2012
- Take a more holistic view of email security on 27th April, 2012
- Unifying electronic communications for enhanced security on 23rd April, 2012
- Cloud-delivered endpoint security on 10th April, 2012
- Taking the offensive on endpoint security on 28th February, 2012
- Best practices for cloud security on 30th January, 2012
- Getting ahead in the cloud on 30th January, 2012
- Security and location on 17th November, 2011
- Migrating to Exchange 2010 and email archiving options on 31st October, 2011
- Best practices for email archiving on 3rd October, 2011
- Email archiving best practices on 29th September, 2011
- The security challenges of modern data centres on 29th August, 2011
- What did IPv6 Day prove? on 26th August, 2011
- Tips for improving the integrity of networks on 23rd August, 2011
- Architecting the security of the next-generation data centre on 9th August, 2011
- Whitelisting and change control for improving integrity on 9th August, 2011
- Taking back control in today’s complex threat landscape on 4th July, 2011
- IPv6 Day on 7th June, 2011
- The state of internet infrastructure security on 19th May, 2011
- DDoS attacks: coming to a network near you on 23rd February, 2011
- Web security in an always-on world on 16th February, 2011
- What to consider when choosing a SaaS or cloud provider on 15th February, 2011
- Critical infrastructure under attack on 11th February, 2011
- Boosting the security of SaaS and web applications on 7th February, 2011
- Charting the vendor landscape for web and email security on 1st February, 2011
- Webinar on developing a user-centric approach to cloud security on 14th January, 2011
- The need to secure all business communications on 17th December, 2010
- Securing retail environments from the insider threat on 17th December, 2010
- The changing nature of US healthcare delivery on 9th December, 2010
- Security challenges in the US healthcare sector on 8th December, 2010
- Today’s threats require joined-up security on 3rd December, 2010
- Anti-virus alone is a poor strategy on 22nd November, 2010
- Securing the internet’s infrastructure on 14th October, 2010
- Optimising security in the enterprise on 13th October, 2010
- Investing in security versus facing the consequences on 7th October, 2010
- Email archiving in the cloud webinar on 16th September, 2010
- The next-generation secure internet on 6th September, 2010
- When the cloud improves security on 25th August, 2010
- Why email and web security should be tied together on 26th July, 2010
- The benefits of basing email and web security in the cloud on 26th July, 2010
- Next-generation email and web security on 26th July, 2010
- Leveraging the cloud for more effective email archiving on 2nd July, 2010
- The need for email archiving on 17th June, 2010
- Call for participants for cloud security survey on 17th June, 2010
- Windows 7 Enterprise: what are you actually getting? on 16th June, 2010
- Move email archives offsite to the cloud on 9th June, 2010
- The benefits of a cloud-based email archiving service on 8th June, 2010
- When email archiving is best done in the cloud on 8th June, 2010
- Efforts to improve data security in the local government sector on 7th June, 2010
- Financial sector reform on 5th May, 2010
- Not protecting your website is irresponsible on 4th May, 2010
- Security challenges in financial services on 1st March, 2010
- Security challenges in telecommunications on 1st March, 2010
- Security challenges in government on 1st March, 2010
- Security: from reactive to proactive on 1st March, 2010
- Why web security is best served in the cloud on 26th February, 2010
- Why web security is best served in the cloud on 17th February, 2010
- Counting the cost on 24th January, 2010
- Education, education, education on 11th January, 2010
- Security breach legislation on 13th October, 2009
- SenSage at O2 Ireland on 10th April, 2009
- HP OpenView – Identity Management Suite on 22nd December, 2005
- Why identity management and strong authentication are converging on 16th November, 2005
- Courion Enterprise Provisioning Suite on 31st October, 2005
- nCipher buys Abridean on 24th October, 2005
- Deploying SSO and biometrics in the race to put out fires on 11th October, 2005
- Identity Management on 4th October, 2005
- Courion’s Enterprise Provisioning Suite on 29th September, 2005
- ActivCard’s Single Sign-on Software on 29th September, 2005
- Computer Associates’ Identity and Access Management Suite r8 on 28th September, 2005
- Abridean’s Automated User Management and Provisioning Technologies on 20th September, 2005
- Software as a service – Salesforce.com’s new application shop on 16th September, 2005
- Avatier Identity Management Technology on 12th September, 2005
- Not-for-profit organisations have security needs too on 9th September, 2005
- Grand Prairie teaches security lessons to other schools on 18th August, 2005
- Basel II Compliance: Another Burden for European CSOs? on 16th August, 2005
- Intrusion Prevention Systems on 1st March, 2005
- Vormetric – CEO Regulations on 1st June, 2004
- Supply Chain Management from Oracle on 30th November, 2003
- Ariba Enterprise Spend Management on 1st October, 2003
- Extended Supply Chain Management on 1st October, 2003
- JD Edwards Supply Chain Management and Supplier Relationship Management on 30th September, 2003
- Microsoft Supply Chain Management on 30th September, 2003
- SAP Adaptive Supply Chain Networks on 30th September, 2003
- Procuri eSourcing on 30th September, 2003
- Frictionless Sourcing on 30th September, 2003
- FreeMarkets Global Supply Management on 30th September, 2003
- AT Kearney Product Lifecycle Sourcing on 30th September, 2003
- Baan Supply Chain Management on 1st September, 2003
- PeopleSoft Supply Chain Management on 1st August, 2003