Red Teaming: thinking and acting like the enemy to stop them in their tracks
Red teaming exercises help organisations to improve their security posture by using adversarial techniques to pinpoint weaknesses.
Read more...
Having stumbled into information security through a chance assignment more than 30 years ago consulting on public key infrastructures, security has become a passion. After initially learning the ropes of being an industry analyst with Aberdeen Group, Fran has continued on this journey and is currently the practice leader for security at Bloor Research, a renowned research and advisory firm. She also contributes to other publications and has recently become an expert contributor for CIO Watercooler, a network for CIOs and leading technologists to share their news and views, and to discuss the challenges facing the industry.
Her current areas of focus include gaining greater insight into security operations, digital identity from individuals to the IoT, GRC and digital transformation.
Fran’s other main areas of interest are new delivery models, such as cloud computing, information governance, web, network and application security, identity and access management, and encryption.
She focuses on the business needs for security technologies, looking at the benefits they gain from their use and how organisations can defend themselves against the threats that they face in an ever-changing landscape.
For more than 20 years, Fran has worked in an advisory capacity as an analyst, consultant and writer.
She writes regularly for a number of publications, including Silicon, Computer Weekly, Computer Reseller News, IT-Analysis and Computing Magazine. Fran is also a regular contributor to Security Management Practices of the Faulkner Information Services division of InfoToday.
Red teaming exercises help organisations to improve their security posture by using adversarial techniques to pinpoint weaknesses.
Read more...The ability to infiltrate networks and remain undetected is a key capability for attackers to gain access to systems, hence the need for threat hunting.
Read more...Once, managed security services were somewhat limited in nature, managing such tools on behalf of customers. MDR services shift that paradigm.
Read more...In the latest of Fran Howarth’s blogs on managed detection and response services, she looks at telemetry, which she feels is a vital ingredient to MDR.
Read more...Estimates from ISC2 indicate that the shortfall of skilled and experienced security professionals could be as high as four million worldwide.
Read more...Connect with Fran Howarth by submitting your details: