Helen Laidlaw

Helen Laidlaw

IT Systems Analyst Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
How Can We Effectively Preserve and Archive Public Data?
Security Operations & Management How Can We Effectively Preserve and Archive Public Data?

Rupert Marais is an in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. In this interview, Rupert will provide insights into the preservation of government web pages and data, the impact of administration changes on digital

February 20, 2025
Evolving Data Privacy: Challenges and Insights from Bruce Schneier
Infrastructure & Network Security Evolving Data Privacy: Challenges and Insights from Bruce Schneier

The landscape of data privacy has undergone significant changes over the past decade, yet many of the core challenges remain unresolved. Bruce Schneier, a renowned security technologist, provided a comprehensive analysis of these issues in his book "Data and Goliath," published nearly ten

February 18, 2025
Can Phishing Techniques Like Email Salting and Homoglyphs Be Stopped?
Infrastructure & Network Security Can Phishing Techniques Like Email Salting and Homoglyphs Be Stopped?

Phishing attacks have become increasingly sophisticated, posing significant challenges to both users and email security systems. Among the latest techniques are email salting and homoglyph attacks, which are designed to bypass spam filters and deceive recipients. This article explores these

February 17, 2025
Are Sanctions Against Zservers the Key to Combating Ransomware Threats?
Infrastructure & Network Security Are Sanctions Against Zservers the Key to Combating Ransomware Threats?

The threat of ransomware has become a pressing issue for countries worldwide, as cybercriminals continue to exploit sophisticated technologies to undermine security and demand exorbitant ransoms. A notable development in this ongoing struggle is the coordinated action taken by the United States,

February 14, 2025
Musk's DOGE Access to Treasury Data Sparks Legal and Security Concerns
Security Operations & Management Musk's DOGE Access to Treasury Data Sparks Legal and Security Concerns

The focal point of this controversy revolves around the increased vulnerability of the U.S. Treasury to hacking, following certain policy decisions by the Trump administration. These policies granted Elon Musk's Department of Government Efficiency (DOGE) access to systems and data at the

February 13, 2025
Can Singaporean Companies Balance DeepSeek's Benefits and Risks?
Data Protection & Privacy Can Singaporean Companies Balance DeepSeek's Benefits and Risks?

In recent times, companies in Singapore find themselves weighing the benefits against the potential risks of adopting the Chinese generative artificial intelligence (AI) model known as DeepSeek. This consideration comes against the backdrop of DeepSeek's recent breakthrough, which promises

February 12, 2025
Senators Question Google and Amazon Over Ads On CSAM-Hosting Sites
Security Operations & Management Senators Question Google and Amazon Over Ads On CSAM-Hosting Sites

Recent actions by US Senators Marsha Blackburn and Richard Blumenthal have brought to light significant concerns regarding the advertising practices of tech giants Amazon and Google. The senators have written letters to the CEOs of these companies, questioning their ad businesses' involvement

February 11, 2025
What Lessons Can Be Learned from 14 Years of systemd Development?
Security Operations & Management What Lessons Can Be Learned from 14 Years of systemd Development?

The development of systemd over the past 14 years has been a journey marked by innovation, controversy, and significant impact on the Linux ecosystem. This article delves into the key lessons learned from its evolution, as highlighted by Lennart Poettering during his talk at FOSDEM 2025. By

February 11, 2025
Which Antivirus is Better: McAfee Total Protection or Norton 360 Deluxe?
Malware & Threats Which Antivirus is Better: McAfee Total Protection or Norton 360 Deluxe?

In today’s digital age, cybersecurity is a paramount concern for users worldwide, making the choice of antivirus software a critical decision. Two prominent names that consistently emerge when discussing robust cybersecurity solutions are McAfee Total Protection and Norton 360 Deluxe. Established a

February 10, 2025
AT&T Sues Broadcom Over Massive 1,050% Price Hike for VMware Support
Security Operations & Management AT&T Sues Broadcom Over Massive 1,050% Price Hike for VMware Support

AT&T recently filed a lawsuit against Broadcom, alleging a massive 1,050 percent price increase for VMware support services over a proposed five-year deal. The telecommunications giant claims that this hike does not align with any reasonable expectation from long-time strategic partners, citing

February 7, 2025
Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later