author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Internet of Things devices are everywhere and if you run IoT devices for your business you need to keep them secure with their firmware up to date.
By Stephen Cooper in Net Admin on December 7, 2023
Automated discovery is probably the most useful IT asset management tool you can have. Find out about agentless discovery systems.
By Stephen Cooper in Net Admin on July 7, 2023
Mobile content management systems let you control the distribution and visibility of corporate data on mobile devices. Find out about MDM clients. 
By Stephen Cooper in Net Admin on July 14, 2022
Both Fortinet and Palo Alto Networks offer system security products and both are moving into the Zero Trust Access arena. Find out more about these two options. 
By Stephen Cooper in Net Admin on July 14, 2022
Cybersecurity tools look for attacks on the systems that they protect. This action is called threat hunting.
By Stephen Cooper in Net Admin on June 21, 2023
Threat hunting is the core process in modern cybersecurity products. Discover the market leaders in this field. 
By Stephen Cooper in Net Admin on December 8, 2023
The term “CyOps” crops up from time to time in IT trade literature and product descriptions, but what does it mean? We investigate.
By Stephen Cooper in Net Admin on July 14, 2022
Cloud Security Posture Management makes sure that risk in your cloud assets is minimized. Find out about how to implement CSPM.
By Stephen Cooper in Net Admin on December 12, 2023
You might hear that a network device is Layer 2, but what does that term mean?
By Stephen Cooper in Net Admin on July 14, 2022
Page 8 of 56