Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Gift Card Fraud Skyrockets, Costing Victims Millions
Identity & Access Management Gift Card Fraud Skyrockets, Costing Victims Millions

With financial scams constantly evolving, we turn to our security specialist, Rupert Marais, for his expertise in cybersecurity and fraud prevention. As criminals increasingly pivot from traditional banking fraud to the less-regulated world of gift cards, consumers are facing new and insidious

Review of Incode Deepsight
Malware & Threats Review of Incode Deepsight

The rapid sophistication of deepfake technology has transformed what was once a social media novelty into a critical security vulnerability for businesses that depend on digital identity verification for their core operations. As synthetic media becomes more accessible and convincing, conventional

Russian Hackers Steal M365 Accounts via Device Code Phishing
Infrastructure & Network Security Russian Hackers Steal M365 Accounts via Device Code Phishing

A sophisticated phishing campaign leveraging a legitimate but often overlooked Microsoft 365 feature has enabled Russian-aligned hackers to bypass conventional security measures and achieve full account takeovers against critical Western targets. This method, known as device code phishing, subverts

Data Breach at Sydney University Exposes 27,500
Data Protection & Privacy Data Breach at Sydney University Exposes 27,500

With us today is Rupert Marais, our in-house Security Specialist, whose expertise in endpoint security and cybersecurity strategy offers a vital perspective on digital threats. We’ll be exploring the recent University of Sydney data breach to understand the deeper issues at play. Our conversation

Is AI Driving the Palantir-ization of IT?
Infrastructure & Network Security Is AI Driving the Palantir-ization of IT?

The Dawn of a New IT Paradigm A profound shift is underway in the information technology sector, one that promises to redefine the very nature of IT services. The recent appointment of former Palantir CIO Jim Siders to lead Shield Technology Partners, a new venture backed by over $100 million, is

Microsoft Patches Three Zero-Days, One Under Active Attack
Endpoint & Device Security Microsoft Patches Three Zero-Days, One Under Active Attack

In the fast-paced world of cybersecurity, staying ahead of threats is a constant battle. This month’s security updates from Microsoft are a stark reminder of that reality, with patches for 56 flaws, including one being actively exploited and two publicly known zero-days. To help us decipher the

PDVSA and Media Clash Over Cyberattack Claims
Malware & Threats PDVSA and Media Clash Over Cyberattack Claims

In the murky aftermath of a digital assault on a nation's economic lifeline, the battle for the truth often proves more challenging than the fight against the malicious code itself. When Venezuela's state-owned oil company, Petróleos de Venezuela (PDVSA), experienced a significant systems failure,

How Is Microsoft Reshaping AI-Powered Cybersecurity?
Security Operations & Management How Is Microsoft Reshaping AI-Powered Cybersecurity?

Today, we're joined by Rupert Marais, our in-house security specialist, to dissect the groundbreaking announcements from Microsoft's recent Ignite conference. The tech giant is fundamentally changing how enterprises access and use AI in cybersecurity by bundling its powerful Security Copilot with

Trend Analysis: Hacktivist Ransomware Models
Malware & Threats Trend Analysis: Hacktivist Ransomware Models

The traditional battle lines of cyberspace are rapidly dissolving as politically motivated hacktivist groups paradoxically embrace the purely commercial Ransomware-as-a-Service model, creating a new and unpredictable breed of threat actor. This emerging trend presents a fascinating contradiction:

Agentic AI Developer Tools – Review
Endpoint & Device Security Agentic AI Developer Tools – Review

The rapid emergence of agentic AI developer tools has fundamentally altered the landscape of software engineering, promising unprecedented efficiency gains while simultaneously introducing a new class of complex security vulnerabilities. Agentic AI developer tools represent a significant

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later