Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Glassworm Malware Strikes Again in Third Wave on VS Code
Data Protection & Privacy Glassworm Malware Strikes Again in Third Wave on VS Code

Imagine opening your trusted code editor, downloading what appears to be a helpful extension, and unknowingly handing over your GitHub credentials, cryptocurrency wallet details, and even control of your machine to malicious actors. This isn’t a hypothetical scenario but the harsh reality of the

Agentic AI Browsers: A Security Nightmare for Teams
Endpoint & Device Security Agentic AI Browsers: A Security Nightmare for Teams

Hey everyone, I’m thrilled to sit down with Rupert Marais, our in-house security specialist who’s been at the forefront of endpoint and device security, cybersecurity strategies, and network management for over a decade. With the rapid evolution of AI technologies, especially in the realm of

India Mandates Sanchar Saathi App to Combat Telecom Fraud
Endpoint & Device Security India Mandates Sanchar Saathi App to Combat Telecom Fraud

Imagine picking up a call from a number that looks local, only to realize moments later that your bank account has been drained by a scammer halfway across the world. Telecom fraud has become a pervasive threat in India, with millions falling victim to sophisticated scams each year. In a bold move

Did Windows 11 Updates Make Your Password Icon Disappear?
Data Protection & Privacy Did Windows 11 Updates Make Your Password Icon Disappear?

If the password icon on the Windows 11 lock screen vanished after recent updates you are not imagining it and you are not alone. A quiet but disruptive regression has made the icon invisible on 24## and 25## systems with multiple sign-in methods enabled, even though the hidden button still opens

Five Security Checkpoints to Keep AI-Generated Code Safe
Security Operations & Management Five Security Checkpoints to Keep AI-Generated Code Safe

Software teams racing to ship features have turned to AI pair programmers that accelerate delivery, unblock routine tasks, and draft complex scaffolding with startling speed, yet that same acceleration can quietly magnify risk by propagating hidden vulnerabilities across services, libraries, and

From Bloated to Hardened: Containers With Near-Zero CVEs
Security Operations & Management From Bloated to Hardened: Containers With Near-Zero CVEs

A quiet shift is racing through software supply chains as enterprises discover that most container images ship with far more code—and far more risk—than applications actually need, and that a smaller, verified base often outperforms patch-chasing at both speed and cost. This analysis examines why

How Did Phone Phishing Expose Harvard's Alumni Data?
Data Protection & Privacy How Did Phone Phishing Expose Harvard's Alumni Data?

A single convincing phone call can do what firewalls and passwords cannot, and that is exactly the scenario that played out when a caller used social engineering to reach Alumni Affairs and Development systems built for fundraising and engagement, prompting rapid containment and a scramble to

How Did Hackers Target Salesforce via Gainsight Apps?
Malware & Threats How Did Hackers Target Salesforce via Gainsight Apps?

In an alarming development within the cybersecurity landscape, a sophisticated hacking campaign has emerged, targeting customer environments of Salesforce, a dominant force in cloud-based software solutions, through applications developed by Gainsight, a company known for its customer success

Eviden Boosts Europe's Cyber Resilience with ECCC Partnership
Infrastructure & Network Security Eviden Boosts Europe's Cyber Resilience with ECCC Partnership

In an era where digital threats loom larger than ever, with cyberattacks targeting critical infrastructure on a near-daily basis across Europe, a groundbreaking collaboration has emerged to fortify the continent's defenses. The selection of Eviden, a prominent brand under the Atos Group

How Does Xerox TriShield 360 Protect SMBs from Cyber Threats?
Infrastructure & Network Security How Does Xerox TriShield 360 Protect SMBs from Cyber Threats?

In an era where cyber threats loom larger than ever, small- and medium-sized businesses (SMBs) often find themselves in a precarious position, lacking the resources and expertise to fend off sophisticated attacks that larger enterprises can more readily combat. Recent studies indicate that over 40%

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later