Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Stolen Eurail Customer Data Appears for Sale Online
Data Protection & Privacy Stolen Eurail Customer Data Appears for Sale Online

The excitement of a European rail journey, once a cherished memory of scenic landscapes and cultural discovery, has been overshadowed by the chilling reality that the personal data of millions of travelers is now a commodity on cybercrime forums. What began as a dream vacation for many has evolved

Microsoft Exchange Bug Blocks Legitimate Emails
Data Protection & Privacy Microsoft Exchange Bug Blocks Legitimate Emails

An essential tool for modern business communication is faltering as a significant bug within Microsoft's Exchange Online service has been incorrectly flagging and quarantining legitimate emails, causing widespread disruption for an unspecified number of customers. The issue, which began on February

Password Manager Security – Review
Identity & Access Management Password Manager Security – Review

While designed as the ultimate bastion for our sprawling digital identities, the very concentration of our most sensitive credentials into a single digital vault transforms password managers into uniquely high-value targets for malicious actors. Password managers represent a significant advancement

Have You Patched the Latest Chrome Zero-Day?
Malware & Threats Have You Patched the Latest Chrome Zero-Day?

With us today is Rupert Marais, our in-house security specialist, to break down the realities of modern web browser security in light of the recently disclosed, actively exploited zero-day vulnerability in Google Chrome. We'll explore the mechanics of this high-severity 'use-after-free' flaw,

What Is Bitwarden's Cupid Vault for Secure Sharing?
Data Protection & Privacy What Is Bitwarden's Cupid Vault for Secure Sharing?

Sharing access to a joint bank account or the family streaming service has often forced individuals into a precarious digital dance, exchanging sensitive credentials through glaringly insecure channels. This common practice exposes critical information to interception and misuse, creating a

Gartner: AI Data Spurs Need for Zero-Trust Governance
Endpoint & Device Security Gartner: AI Data Spurs Need for Zero-Trust Governance

With us today is Rupert Marais, our in-house security specialist whose expertise spans everything from endpoint security to overarching cybersecurity strategy. We’re diving deep into the seismic shifts AI is causing in data governance and risk management. We'll explore the urgent need for a

Microsoft 365 Outage Locks Out North American Admins
Data Protection & Privacy Microsoft 365 Outage Locks Out North American Admins

For countless IT administrators across North America, the workday began not with a routine check of systems but with a digital wall, as the central nervous system of Microsoft 365 suddenly and inexplicably went offline. The Critical Hub Goes Dark Understanding the Admin Center Disruption A

How Are State-Sponsored Hackers Weaponizing AI?
Data Protection & Privacy How Are State-Sponsored Hackers Weaponizing AI?

The line between a meticulously researched professional inquiry and a state-sponsored cyberattack has blurred to the point of invisibility, thanks to the widespread adoption of artificial intelligence by the world’s most sophisticated threat actors. What was once the domain of theoretical security

Conduent Breach Exposes Data of Millions, Including Volvo
Data Protection & Privacy Conduent Breach Exposes Data of Millions, Including Volvo

A data breach within a company that operates quietly in the background of corporate America has thrust the pervasive and often invisible risks of the digital supply chain into the spotlight, affecting millions who had never even heard its name. The incident, originating at business services giant

GitHub's Uptime Struggles Signal a Wider Cloud Problem
Infrastructure & Network Security GitHub's Uptime Struggles Signal a Wider Cloud Problem

The once-unshakable expectation of constant availability for critical development infrastructure is being seriously challenged by a series of persistent service disruptions, with one of the industry's most essential platforms at the center of the storm. For countless developers and organizations,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later