Peter Stephenson

Peter Stephenson, technology editor, SC Media

Technology Editor Peter Stephenson has worked with SC Media in some capacity for years. Indeed, his straight-talking opinions once filled our news pages in a long-standing monthly contribution that since has been taken over by a rotation of experts. In addition to overseeing SC Media's reviews and writing the "Threat Hunter" blog, Stephenson also is a researcher and author. His areas of expertise include information assurance and risk, information warfare, counter-terrorism, cyber criminology, cyber jurisprudence, and digital investigation and forensics. He has taught information assurance, network attack and defense, digital forensics and cyber investigation on both the graduate and undergraduate levels. He started his 50+ year career as a U.S. Navy cryptographer, then moved into the private sector where he operated his own information security consulting practice for some 20 years. Navigating the industry and his career with aplomb, he then became director of technology for the global security practice of Netigy Corporation and was, until July 2003, the director of technology and a research coordinator for QinetiQ Trusted Information Management, a large international information security professional and managed services company. He holds a doctorate in digital investigation and is pursuing a second PhD in law. He holds the CISSP (retired) designation from (ISC)2 and retired as a Fellow of the American Academy of Forensic Sciences. He also is former CISO of Norwich University. In short, Stephenson knows a thing or two about IT security.

Most Recent Articles by Peter Stephenson

Enterprise-wide defenses

This is an important and, in some regards, disappointing review group. It's important because it deals with managing ransomware, arguably the most serious cyberthreat today.

Onapsis Security Platform (OSP)

When we look back to the birth of Enterprise Resource Planning (ERP) we must include SAP as one of the early pioneers.

Lab Approved One Year Later: Cisco Umbrella Investigate

This is a one-stop starting point for any investigation where you have a hash, IP, domain, URL, ASN or email address of a suspected domain registrant.

Adding threat intel to your security stack

This month we are addressing another of the new categories that we've added this year: threat intelligence.

First Look: Observable Networks: Observable Enterprise & Cloud

Observable Enterprise & Cloud uses a unique approach to threat detection.