Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Gartner: AI Data Spurs Need for Zero-Trust Governance
Endpoint & Device Security Gartner: AI Data Spurs Need for Zero-Trust Governance

With us today is Rupert Marais, our in-house security specialist whose expertise spans everything from endpoint security to overarching cybersecurity strategy. We’re diving deep into the seismic shifts AI is causing in data governance and risk management. We'll explore the urgent need for a

Microsoft 365 Outage Locks Out North American Admins
Data Protection & Privacy Microsoft 365 Outage Locks Out North American Admins

For countless IT administrators across North America, the workday began not with a routine check of systems but with a digital wall, as the central nervous system of Microsoft 365 suddenly and inexplicably went offline. The Critical Hub Goes Dark Understanding the Admin Center Disruption A

How Are State-Sponsored Hackers Weaponizing AI?
Data Protection & Privacy How Are State-Sponsored Hackers Weaponizing AI?

The line between a meticulously researched professional inquiry and a state-sponsored cyberattack has blurred to the point of invisibility, thanks to the widespread adoption of artificial intelligence by the world’s most sophisticated threat actors. What was once the domain of theoretical security

Conduent Breach Exposes Data of Millions, Including Volvo
Data Protection & Privacy Conduent Breach Exposes Data of Millions, Including Volvo

A data breach within a company that operates quietly in the background of corporate America has thrust the pervasive and often invisible risks of the digital supply chain into the spotlight, affecting millions who had never even heard its name. The incident, originating at business services giant

GitHub's Uptime Struggles Signal a Wider Cloud Problem
Infrastructure & Network Security GitHub's Uptime Struggles Signal a Wider Cloud Problem

The once-unshakable expectation of constant availability for critical development infrastructure is being seriously challenged by a series of persistent service disruptions, with one of the industry's most essential platforms at the center of the storm. For countless developers and organizations,

New ZeroDayRAT Malware Sells Nation-State Spying Tools
Malware & Threats New ZeroDayRAT Malware Sells Nation-State Spying Tools

We're joined today by Rupert Marais, our in-house security specialist, to discuss an alarming new trend in mobile threats. A new form of spyware, dubbed ZeroDayRAT, is being sold openly on platforms like Telegram, essentially packaging sophisticated surveillance tools for a mass-market criminal

Is Your Security Orchestration Ready for 2026?
Security Operations & Management Is Your Security Orchestration Ready for 2026?

The rapid proliferation of security automation tools across enterprise networks has created a deceptive sense of progress, masking a critical and widening gap between rudimentary scripting and the sophisticated orchestration required to manage modern hybrid environments. While many organizations

Is a New Fortinet SSO Flaw Putting Your Firewall at Risk?
Malware & Threats Is a New Fortinet SSO Flaw Putting Your Firewall at Risk?

Federal authorities and cybersecurity researchers are raising the alarm over a critical vulnerability in Fortinet's FortiCloud single sign-on service that is not just theoretical but is being actively exploited in the wild. This significant security flaw, tracked as CVE-2026-24858, creates a

Hackers Exploit Critical SolarWinds Help Desk Flaw
Data Protection & Privacy Hackers Exploit Critical SolarWinds Help Desk Flaw

A severe remote code execution vulnerability is now under active exploitation, placing organizations that use the SolarWinds Web Help Desk platform at significant risk of compromise. Tracked as CVE-2025-40551, the critical flaw arises from the insecure deserialization of untrusted data, a common

How Clever Compilers Create Security Flaws
Infrastructure & Network Security How Clever Compilers Create Security Flaws

The very tools designed to forge robust and efficient software have become an unexpected source of critical vulnerabilities, pitting security developers against an invisible adversary hidden within their own development pipeline. In the quest for maximum performance, modern compilers aggressively

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later