Stephen  Lawton

Stephen Lawton

Author, tech journalist, consultant

I am a business journalist, consultant, and currently special projects editor with SC Magazine. Follow me on Twitter: @afabmedia or visit www.afab.com.

  • 92
    stories
  • 75K
    words
92
stories for
17
publications
Stephen Lawton's stories for
Show all
Eappsecurity1214 700875 article
SC Magazine

2014 Application security ebook - SC Magazine

2014 Application security ebook - SC Magazine

Eiamcover 717595 article
SC Magazine

2015 identity and access management ebook - SC Magazine

2015 identity and access management ebook - SC Maga...

Open uri20121121 17487 1ljis37 article
SC Magazine

Cyber Warfare The next Cold War

Instead of military assaults, today's adversaries hire coders to create attacks that can run autonomously for years, says Stephen Lawton.
History books tell us that the Cold War ended in roughly 1991 ...

Siemebookimage 791589 article
SC Magazine

SC Magazine eBook on SIEM (2015) - SC Magazine

SC Magazine eBook on SIEM (2015) - SC Magazine

Epcicoverimage 770894 article
SC Magazine

2015 PCI eBook - SC Magazine

2015 PCI eBook - SC Magazine

Auditandcomplianceebookcov 657393 article
SC Magazine

2014 audit and compliance ebook - SC Magazine

2014 audit and compliance ebook - SC Magazine

Open uri20121121 10980 19w025i article
SC Magazine

Cyber espionage

Instead of spending billions of dollars to supply massive armies, today's adversaries hire code-writers to create attacks that run autonomously for years with little or no human intervention.
Click h...

Open uri20121121 10980 1dt2ear article
SC Magazine

Arresting cyberespionage

May 01, 2011
If ever there was any doubt whether the security industry had found a way to stop cyberespionage, the activities of ...

Stringio article
SC Magazine

Cyber threat intelligence

In today's environment, potential attackers have all the time they need to mount a sustained intrusion against a target company or government agency. While companies need to understand past attacks so...

SC Magazine

Virtualization - SC Magazine

Virtualization - SC Magazine

Open uri20131102 4686 lv64wh article
SC Magazine

Clutter in the airwaves: Mobile payment security

While already ubiquitous in much of the world, mobi...

Open uri20130914 26096 1b8d8sm article
SC Magazine

Chalk IT up: Boardroom communication

Speak in business terms and convey risk when attemp...

Stringio article
SC Magazine

Hard target The APT scenario

APTs can be thwarted with the right tools and an informed user base, says Stephen Lawton.
In an advanced persistent threat (APT) attack, perpetrators research a specific target and customize the malwa...

Open uri20121121 10980 1fm0jqs article
SC Magazine

GRC Harmonizing business practices

June 01, 2011
Negotiating the minefield that is governance, risk and compliance (GRC) can be a daunting task for c...

Stringio article
SC Magazine

Government Backup plans

The IT infrastructure of government, military and enterprise bodies needs to keep running after a disaster, reports Stephen Lawton.