Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.
Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.
After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology
Network traffic analysis can help you improve network performance through capacity planning and traffic shaping measures. It is also used for security measures. We show you the best NTA tools.
Site24x7 is a cloud-based system monitor that offers a range of modules, including Server Monitoring. Find out what you get for the free and paid solutions and what its capabilities are.
The Dark Web is reported to be a home for hackers and terrorists and it could pose a threat to your company. Find out precisely what the Dark Web is and what you can do to block it.
IT automation takes many forms. Any assistance to get repetitive admin tasks and data-processing procedures completed automatically is a great help. Discover the best IT automation software & tools.
SD-WANs offer an easy, cost-effective way to unify the networks of a multi-site business. We explore which SD-WAN systems will get your LANs merged into a WAN.
The system accounts of your customers and employees are points of vulnerability that need to be protected. Find out how account takeover happens and how to prevent it.
Active Directory can be difficult to organize and you will need to document the system for many reasons during its service life. Find out which tools can help you document Active Directory.