Helen Laidlaw

Helen Laidlaw

Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.

Cloudflare Enhances SASE Offering with Kivera Acquisition and Integration
Infrastructure & Network Security Cloudflare Enhances SASE Offering with Kivera Acquisition and Integration

In a strategic move aimed at bolstering its Secure Access Service Edge (SASE) portfolio, Cloudflare has announced the acquisition of Kivera, a company recognized for its expertise in cloud security, data protection, and compliance. The acquisition will see Kivera's capabilities integrated into

October 14, 2024
Managing Cyber Security Risks in Financial Advisory Firms
Security Operations & Management Managing Cyber Security Risks in Financial Advisory Firms

Cyber security threats are a pressing issue for financial advisers and smaller financial services firms. With escalating cyber attacks such as ransomware, data theft, and cyber-facilitated fraud, these entities face numerous challenges. Beyond operational disruptions, the regulatory and personal

October 10, 2024
Are Cybersecurity Giants Like Dr.Web Safe from Sophisticated Hacks?
Data Protection & Privacy Are Cybersecurity Giants Like Dr.Web Safe from Sophisticated Hacks?

The recent data breach allegedly carried out by the hacking group DumpForums that targeted Dr.Web, a prominent Russian cybersecurity firm, has sent shockwaves through the cybersecurity community. The hackers claim to have stolen a staggering 10 terabytes of sensitive data, severely tarnishing

October 9, 2024
How Are Cybercriminals Exploiting Trusted File Hosting Services?
Infrastructure & Network Security How Are Cybercriminals Exploiting Trusted File Hosting Services?

Cybercriminals are increasingly turning to trusted file hosting services such as SharePoint, OneDrive, and Dropbox to launch sophisticated attacks. This trend leverages the trust users have in these platforms to bypass security measures and execute malicious activities. Understanding this evolving

October 8, 2024
iboss Earns Strong Performer Status in 2024 Voice of the Customer Report
Infrastructure & Network Security iboss Earns Strong Performer Status in 2024 Voice of the Customer Report

The cybersecurity landscape is ever-evolving, demanding agile and robust solutions from industry leaders. In this dynamic arena, iboss has garnered notable acclaim, positioning itself as a Strong Performer in the 2024 Voice of the Customer report. This accolade, awarded based on peer reviews,

October 8, 2024
What Are the Lessons From the T-Mobile FCC Cybersecurity Settlement?
Data Protection & Privacy What Are the Lessons From the T-Mobile FCC Cybersecurity Settlement?

The recent settlement between the Federal Communications Commission (FCC) and T-Mobile has cast a spotlight on the critical importance of robust cybersecurity measures within the telecommunications industry. The telecom giant suffered multiple data breaches over a three-year period from 2021 to

October 2, 2024
Are UK Firms Ready for Rising Cyber Threats and Connectivity Issues?
Endpoint & Device Security Are UK Firms Ready for Rising Cyber Threats and Connectivity Issues?

In today's digital age, UK organizations face an array of cybersecurity and connectivity challenges. Research by TeamViewer, involving 500 business leaders across six countries, sheds light on the vulnerabilities and perceptions of UK businesses concerning their cybersecurity resilience. With

September 19, 2024
Artificial Intelligence and Cybersecurity: Outlook for 2025
Editorial Artificial Intelligence and Cybersecurity: Outlook for 2025

With cybercrime on the rise and expected to cost the world more than $10 trillion every year , the application of AI in data protection has never been more important. Read on to investigate how business entities can strengthen their online defenses with the help of new technologies. Market

September 18, 2024
How Did a Ransomware Attack Shut Down Charles Darwin School?
Malware & Threats How Did a Ransomware Attack Shut Down Charles Darwin School?

The recent ransomware attack on Charles Darwin School in Biggin Hill, Kent, provides a stark reminder of the vulnerabilities within educational institutions. This attack led to a temporary closure of the school and highlighted various security concerns and operational disruptions that have

September 13, 2024
Can USAA Recover from Its Recent Major Data Breach?
Data Protection & Privacy Can USAA Recover from Its Recent Major Data Breach?

The recent data breach at USAA, affecting over 32,000 customers nationwide, underscores ongoing challenges in cybersecurity for large organizations and showcases the implications of such breaches on customer trust and data security. USAA, known for serving military members and their families, now

September 13, 2024
Loading
Latest articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for subscribing.
We'll be sending you our best soon.
Something went wrong, please try again later