Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

The data your company holds needs to be protected against accidental or intentional damage and theft.
By Stephen Cooper in Net Admin on March 14, 2025
Device control helps data loss prevention systems block unauthorized exfiltration of data. Find out about the best tools for the job.
By Stephen Cooper in Net Admin on March 4, 2025
Forcepoint DLP blocks thieves from extracting data from your system. Find out more about this cybersecurity tool. 
By Stephen Cooper in Net Admin on March 10, 2025
Ethical hacking discovers system security weaknesses by implementing methods that hackers use. Find out about the tools for the job.
By Stephen Cooper in Net Admin on February 21, 2025
The internet doesn’t exist in North Korea outside of the offices of government agencies. Find out what this country is up to and why no one in North Korea can access the Web.
By Stephen Cooper in VPN & Privacy on August 27, 2021
Pro-democracy research institute Freedom House classifies Egypt’s internet position as “not free.” So should you be wary when visiting the country? We explain the situation.
By Stephen Cooper in VPN & Privacy on August 27, 2021
India has pinned its dash for economic growth on the IT sector. Still, is the country fully prepared for the cybersecurity risks and the outside political influences that an entire digital economy could bring?
By Stephen Cooper in VPN & Privacy on August 27, 2021
Pakistan spans two worlds that encompass traditional cultures with a highly organized Civil Service. This gives the country a confusing approach to technology which can be difficult for outsiders to understand. 
By Stephen Cooper in VPN & Privacy on August 27, 2021
Penetration testing is a complicated process, but it gets easier if you have the right tools.
By Stephen Cooper in Net Admin on January 15, 2025
Page 32 of 71