Stephen  Lawton

Stephen Lawton

Author, tech journalist, consultant

I am a business journalist, consultant, and currently special projects editor with SC Magazine. Follow me on Twitter: @afabmedia or visit www.afab.com.

  • 92
    stories
  • 75K
    words
92
stories for
17
publications
Stephen Lawton's stories for
Show all
Vpn article
TomsITPro

Top 10 Myths About Virtual Private Networks (VPNs) Debunked

Top 10 Myths About Virtual Private Networks (VPNs) ...

Eappsecurity1214 700875 article
SC Magazine

2014 Application security ebook - SC Magazine

2014 Application security ebook - SC Magazine

Eiamcover 717595 article
SC Magazine

2015 identity and access management ebook - SC Magazine

2015 identity and access management ebook - SC Maga...

Open uri20121121 17487 1ljis37 article
SC Magazine

Cyber Warfare The next Cold War

Instead of military assaults, today's adversaries hire coders to create attacks that can run autonomously for years, says Stephen Lawton.
History books tell us that the Cold War ended in roughly 1991 ...

Siemebookimage 791589 article
SC Magazine

SC Magazine eBook on SIEM (2015) - SC Magazine

SC Magazine eBook on SIEM (2015) - SC Magazine

Epcicoverimage 770894 article
SC Magazine

2015 PCI eBook - SC Magazine

2015 PCI eBook - SC Magazine

dincloud.com

Identity and Access Management in the Cloud

dinCloud Bloga;
Identity and Access Management in the Cloud
Jun 11, 2015

Cloud computing opens up tremendous opportunities for companies ...

Cloud security cover w 600 article
TomsITPro

Top 9 Security Questions To Ask Your Cloud Provider

Top 9 Security Questions To Ask Your Cloud Provider...

Auditandcomplianceebookcov 657393 article
SC Magazine

2014 audit and compliance ebook - SC Magazine

2014 audit and compliance ebook - SC Magazine

Pci compliance article
TomsITPro

PCI Compliance: What Small Business Owners Need to Know

PCI Compliance: What Small Business Owners Need to ...

garage.godaddy.com

10 ways to keep hackers’ hands off your e-commerce website

10 ways to keep hackers’ hands off your e-commerce ...

Workspot 2 dashboard w 600 article
TomsITPro

Workspot: Client/Server Revitalized As Workspace As A Service

Workspot: Client/Server Revitalized As Workspace As...

Datasecuritytravel w 500 article
TomsITPro

Informatica Unveils Secure@Source Data Intelligence Software

Informatica Unveils Secure@Source Data Intelligence...

Pki article
TomsITPro

Introduction to Public Key Infrastructure (PKI)

Introduction to Public Key Infrastructure (PKI)

Sitelock logo w 500 article
TomsITPro

SiteLock Infinity Automates Website Security Scans

SiteLock Infinity Automates Website Security Scans