Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
The Quantum Era of Cybersecurity Has Already Begun
Security Operations & Management The Quantum Era of Cybersecurity Has Already Begun

While many enterprise leaders still view the dawn of quantum computing as a distant technological horizon, the unsettling reality is that its shadow already looms over today's digital infrastructure, creating profound and often invisible security vulnerabilities. The silent integration of

Resemble AI Raises $13M to Fight Rising Deepfake Threat
Data Protection & Privacy Resemble AI Raises $13M to Fight Rising Deepfake Threat

In an increasingly urgent battle against the proliferation of artificial intelligence-generated fraudulent content, Resemble AI has successfully closed a US$13 million strategic investment round, bringing its total venture funding to a formidable US$25 million. This significant infusion of capital,

Can Your Defenses Stop MuddyWater's UDPGangster?
Malware & Threats Can Your Defenses Stop MuddyWater's UDPGangster?

Today we’re speaking with Rupert Marais, our in-house Security Specialist, to dissect a new threat from a familiar adversary. The Iranian-backed group MuddyWater has deployed a new backdoor, UDPGangster, in a targeted campaign against entities in Turkey, Israel, and Azerbaijan. This interview will

Could DFARS 252.204-7025 Disqualify Your Bid?
Security Operations & Management Could DFARS 252.204-7025 Disqualify Your Bid?

For defense contractors, the competitive landscape is increasingly defined not just by technical capability or price, but by cybersecurity posture, and a single provision buried in a solicitation can be the difference between a winning proposal and an immediate disqualification. While many

Zero Trust’s Reality Check for Legacy Systems
Editorial Zero Trust’s Reality Check for Legacy Systems

The castle-and-moat security model is obsolete. For years, security leaders have heard the same refrain: the perimeter is dead, erased by cloud adoption and remote work. In its place, perimeterless architectures like Zero Trust have emerged as the new standard for protecting scattered data,

Oracle EBS Breach Hits Universities and Corporations Hard
Data Protection & Privacy Oracle EBS Breach Hits Universities and Corporations Hard

Imagine a digital fortress, trusted by universities and corporate giants alike, suddenly crumbling under a sophisticated cyberattack. This is the harsh reality faced by over 100 organizations worldwide due to a massive breach in Oracle’s E-Business Suite (EBS). The fallout has exposed sensitive

React2Shell Flaw Exploited by Chinese Threat Groups
Endpoint & Device Security React2Shell Flaw Exploited by Chinese Threat Groups

What happens when a tool millions of developers trust becomes a weapon in the hands of cyber adversaries? In an era where web applications power everything from e-commerce to government portals, a devastating flaw in React, a cornerstone JavaScript library, has emerged as a global threat. Dubbed

Marquis Data Breach Exposes 788,000 to Identity Theft Risk
Data Protection & Privacy Marquis Data Breach Exposes 788,000 to Identity Theft Risk

In an era where digital transactions are as routine as morning coffee, the security of personal data hangs by a thread. On August 14, a staggering breach at Marquis, a Texas-based fintech powerhouse, exposed the sensitive information of 788,000 individuals to potential cybercriminals. This

Glassworm Malware Strikes Again in Third Wave on VS Code
Data Protection & Privacy Glassworm Malware Strikes Again in Third Wave on VS Code

Imagine opening your trusted code editor, downloading what appears to be a helpful extension, and unknowingly handing over your GitHub credentials, cryptocurrency wallet details, and even control of your machine to malicious actors. This isn’t a hypothetical scenario but the harsh reality of the

Agentic AI Browsers: A Security Nightmare for Teams
Endpoint & Device Security Agentic AI Browsers: A Security Nightmare for Teams

Hey everyone, I’m thrilled to sit down with Rupert Marais, our in-house security specialist who’s been at the forefront of endpoint and device security, cybersecurity strategies, and network management for over a decade. With the rapid evolution of AI technologies, especially in the realm of

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later