author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

The internet doesn’t exist in North Korea outside of the offices of government agencies. Find out what this country is up to and why no one in North Korea can access the Web.
By Stephen Cooper in VPN & Privacy on August 27, 2021
Pro-democracy research institute Freedom House classifies Egypt’s internet position as “not free.” So should you be wary when visiting the country? We explain the situation.
By Stephen Cooper in VPN & Privacy on August 27, 2021
India has pinned its dash for economic growth on the IT sector. Still, is the country fully prepared for the cybersecurity risks and the outside political influences that an entire digital economy could bring?
By Stephen Cooper in VPN & Privacy on August 27, 2021
Pakistan spans two worlds that encompass traditional cultures with a highly organized Civil Service. This gives the country a confusing approach to technology which can be difficult for outsiders to understand. 
By Stephen Cooper in VPN & Privacy on August 27, 2021
Penetration testing is a complicated process, but it gets easier if you have the right tools.
By Stephen Cooper in Net Admin on April 5, 2024
Developing mobile apps has its own particular set of procedures and standards. Find out how to integrate security testing into the pipeline.
By Stephen Cooper in Net Admin on June 13, 2023
Metasploit is a hacker tool that penetration testers can use to probe a system for vulnerabilities.
By Stephen Cooper in Net Admin on October 21, 2022
Digital Guardian is a data loss prevention system. Find out what its strengths are and whether you should try it.
By Stephen Cooper in Net Admin on September 19, 2023
Data needs to be protected. But don’t forget that you need to secure data transfers as well as data stores.
By Stephen Cooper in Net Admin on February 19, 2024
Page 18 of 56