Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Burp Suite is a free penetration testing tool and a paid vulnerability scanner. Find out more about this cybersecurity package and how you would use it.
By Stephen Cooper in Net Admin on February 9, 2023
Teramind DLP is a flexible security package with a lot of options. Find out whether this data loss prevention system is right for you and which plan you should choose.
By Stephen Cooper in Net Admin on June 19, 2024
McAfee is a reliable name in cybersecurity. Find out about the data loss prevention system offered by this brand.
By Stephen Cooper in Net Admin on June 12, 2024
Syria’s problems are well known. However, those that still live and work there need to get on with life, and the internet forms a part of that task. Find out about the state of the internet in Syria today.
By Stephen Cooper in VPN & Privacy on September 2, 2021
WebInspect is a dynamic application security testing tool, but it isn’t the only one. Find out about other security testing systems that can do the same job.
By Stephen Cooper in Net Admin on August 16, 2023
The data your company holds needs to be protected against accidental or intentional damage and theft.
By Stephen Cooper in Net Admin on January 11, 2023
Device control helps data loss prevention systems block unauthorized exfiltration of data. Find out about the best tools for the job.
By Stephen Cooper in Net Admin on May 9, 2024
Forcepoint DLP blocks thieves from extracting data from your system. Find out more about this cybersecurity tool. 
By Stephen Cooper in Net Admin on August 23, 2023
Ethical hacking discovers system security weaknesses by implementing methods that hackers use. Find out about the tools for the job.
By Stephen Cooper in Net Admin on March 25, 2024
Page 24 of 63