Fran Howarth specialises in the field of security, primarily information security, but with a keen interest in physical security and how the two are converging. Fran’s other main areas of interest are new delivery models, such as cloud computing, information governance, web, network and application security, identity and access management, and encryption.
Fran focuses on the business needs for security technologies, looking at the benefits they gain from their use and how organisations can defend themselves against the threats that they face in an ever-changing landscape.
For more than 20 years, Fran has worked in an advisory capacity as an analyst, consultant and writer. She writes regularly for a number of publications, including Silicon, Computer Weekly, Computer Reseller News, IT-Analysis and Computing Magazine. Fran is also a regular contributor to Security Management Practices of the Faulkner Information Services division of InfoToday.
Research from Fran Howarth
- Ransomware just met its match on 24th March, 2023
- If it’s not integrated, don’t fall for it on 15th March, 2023
- Levelling the playing field with DLP for the midmarket on 22nd February, 2023
- Managed Detection and Response Services (2023) on 27th January, 2023
- The increasing burden of regulations on 14th December, 2022
- Data provisioning challenges in a changing landscape on 7th December, 2022
- The state of data analytics on 7th December, 2022
- How a zero trust approach can help to achieve effective and mutable digital transformation on 10th November, 2022
- The many flavours of threat detection and response on 15th September, 2022
- Autonomous XDR for a well-rounded defence on 31st August, 2022
- Alert Logic MDR: case studies on 10th August, 2022
- IDaaS: Identity at the heart of security on 26th May, 2022
- Network Detection and Response on 18th March, 2022
- The Promise of XDR on 18th March, 2022
- The promise of NDR on 18th March, 2022
- What is XDR? on 18th March, 2022
- Autonomous and integrated security for peace of mind on 20th January, 2022
- Human Expertise is Key to Intelligent Incident Response on 7th January, 2022
- The ABCs of cloud security on 16th December, 2021
- Disrupters in the Privilege Management Market on 23rd April, 2021
- Privilege Management on 20th April, 2021
- Privilege Management Technologies on 20th April, 2021
- Managed Detection and Response Services (2021) on 3rd February, 2021
- Cutting through the fog on 20th November, 2020
- Managed Detection and Response on 13th November, 2020
- MDR: a path to outcome-based security on 13th November, 2020
- Identity Management for the Modern Era on 26th August, 2020
- Red Teaming on 3rd July, 2020
- Outsmarting attackers: the role of threat hunting in MDR on 5th May, 2020
- The Complexity Trap on 21st April, 2020
- Skills shortages driving the need for MDR services on 16th April, 2020
- Telemetry: the vital ingredient in MDR on 9th April, 2020
- EDR vs EDR MDR on 1st April, 2020
- The importance of endpoints to security on 24th March, 2020
- What is MDR and why is it needed? on 18th March, 2020
- Managed Detection and Response Services on 4th March, 2020
- Cyber Catalyst: driving the future of cyber insurance on 6th November, 2019
- Open Cybersecurity Alliance – what is it and why is it needed? on 22nd October, 2019
- GDPR Compliance on 18th September, 2019
- AI and cybersecurity: puppies grow up to be guard dogs on 2nd August, 2019
- Who goes there? Focus on identities to reduce business risk on 31st July, 2019
- Protecting the crown jewels: focus on privileged account security on 31st May, 2019
- GRC realities on 8th February, 2019
- State of Industrial and OT Security Report 2018 on 18th December, 2018
- Endpoint detection and response on 7th December, 2018
- The ongoing evolution of SIEM on 7th December, 2018
- Security Response Orchestration on 5th December, 2018
- User and Entity Behavioural Analytics on 5th December, 2018
- Encryption on 7th November, 2018
- Security is a human problem on 20th September, 2018
- Ensuring the future of website security on 4th September, 2018
- Driving into the future with connected cars on 6th July, 2018
- Overcoming GDPR compliance challenges on 11th April, 2018
- Overcoming the complexity gap on 10th July, 2017
- Evolving uses of the kill chain framework on 10th July, 2017
- Engendering trust in an online world on 6th July, 2017
- Proactive response on 22nd November, 2016
- The importance of a data protection platform for GDPR compliance on 29th September, 2016
- The promise of managed endpoint security on 27th September, 2016
- Selling unsecure websites is not an option on 24th March, 2016
- Bit9 + Carbon Black emerges as Carbon Black on 3rd February, 2016
- How to raise your organisation’s security maturity level on 29th January, 2016
- Data protection in France on 29th January, 2016
- For the EU’s new data protection regulation, encryption should be the default option on 10th November, 2015
- Is security an inhibitor to cloud? on 27th October, 2015
- Taking control of file-sharing services on 27th October, 2015
- Turning the tables on cyber criminals on 3rd August, 2015
- Glasswall Solutions email security on 26th June, 2015
- Security industry market trends on 13th April, 2015
- AlienVault Unified Security Management System (USM) on 8th April, 2015
- Solving the complexities of SAP account and entitlement reviews on 3rd March, 2015
- Practices for Enhancing Data Security on 23rd February, 2015
- The role of trusted data in security intelligence on 13th February, 2015
- The need for active response to advanced threats on 20th November, 2014
- LogRhythm’s continued momentum on 4th November, 2014
- Solving the puzzle for actionable insight on 30th October, 2014
- Advanced threat protection and remediation on 30th October, 2014
- Defending against the rogue on 28th October, 2014
- Document Content Security V2 on 10th September, 2014
- Security intelligence: solving the puzzle for actionable insight on 8th September, 2014
- Major trends and developments in the advanced threat protection market on 4th September, 2014
- Managing the BYOD risk on 19th August, 2014
- Hexis Cyber Solutions: a new entrant to the NAC market on 18th August, 2014
- BeyondTrust MAS TRM on 11th July, 2014
- Meeting MAS Regulations on 27th May, 2014
- Good information governance is good business practice on 27th May, 2014
- Taking control of file sharing services on 25th April, 2014
- What the Bit9 + Carbon Black merger is all about on 31st March, 2014
- Document Content Security on 25th March, 2014
- A brave new (pretty scary) world on 21st March, 2014
- The perils of the privileged insider on 17th March, 2014
- Advanced Threat Protection on 10th March, 2014
- The need to protect against file-based attacks on 21st February, 2014
- New standard for simpler, stronger online authentication on 3rd February, 2014
- DDoS attacks: “the cost of doing business online” on 29th January, 2014
- FireEye acquires Mandiant for nearly US$1 billion on 6th January, 2014
- SolarWinds Log & Event Manager on 6th January, 2014
- The state of play for identity management services on 6th December, 2013
- Glasswall Solutions on 4th December, 2013
- Content assurance and advanced threat protection for valuable business documents on 20th November, 2013