Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
EA and Google Team Up to Boost Security for Gamer Accounts
Identity & Access Management EA and Google Team Up to Boost Security for Gamer Accounts

Amidst growing concerns over online security, EA has taken significant steps to protect its users' accounts from being compromised by joining forces with Google. This collaboration is primarily centered around the Cross-Account Protection program, which allows for the secure sharing of fraud

How Will FullFibre and Gigabit IQ Transform UK Internet Security?
Infrastructure & Network Security How Will FullFibre and Gigabit IQ Transform UK Internet Security?

In a bid to revolutionize the digital landscape across the United Kingdom, FullFibre Limited has announced a strategic partnership with broadband newcomer Gigabit IQ. FullFibre, operating an extensive open-access FTTP (Fiber to the Premises) network that covers 380,000 UK premises, aims to give

How Can AI-Powered Tools Enhance Customer Data Security?
Data Protection & Privacy How Can AI-Powered Tools Enhance Customer Data Security?

The digital age, while offering vast conveniences and access, has also brought a daunting challenge: the protection of customer data amidst a surge in identity security breaches. Hackers are increasingly targeting dormant accounts laden with sensitive information, making the security of customer

LameDuck's Skynet Botnet Executes Over 35,000 Global DDoS Attacks
Infrastructure & Network Security LameDuck's Skynet Botnet Executes Over 35,000 Global DDoS Attacks

In an alarming escalation of cyber threats, LameDuck's Skynet Botnet has recently conducted over 35,000 Distributed Denial of Service (DDoS) attacks on a worldwide scale, leading to substantial disruptions and economic losses for various organizations. A DDoS attack is designed to cripple the

Netskope Appoints Colette Kitterhing as VP for UK and Ireland
Infrastructure & Network Security Netskope Appoints Colette Kitterhing as VP for UK and Ireland

The recent announcement that Colette Kitterhing will be joining Netskope as the new vice president for the UK and Ireland has generated significant interest in the tech community. Netskope, a leader in secure access service edge (SASE) technology, is known for its innovative, next-generation

Are Managed Services the Future of Comprehensive Cybersecurity?
Malware & Threats Are Managed Services the Future of Comprehensive Cybersecurity?

In today's rapidly evolving digital landscape, traditional cybersecurity measures are increasingly proving inadequate. The rise of cloud computing, remote work, bring your own device (BYOD) policies, and the Internet of Things (IoT) has expanded the attack surface, making it more challenging

Advanced Email Threats Escalate in Q3: VIPRE Security Report
Infrastructure & Network Security Advanced Email Threats Escalate in Q3: VIPRE Security Report

In its recently released Q3 2024 Email Threat Trends Report, VIPRE Security Group highlighted the evolving sophistication of email-based threats, which are increasingly affecting various industries globally. The report primarily focused on business email compromise (BEC) and malspam campaigns,

Securing Generative AI: The Role of Unified SASE Solutions
Infrastructure & Network Security Securing Generative AI: The Role of Unified SASE Solutions

In the rapidly evolving landscape of generative AI, the integration of advanced security measures is paramount. As organizations harness the transformative power of generative AI, they must also address the significant security and network infrastructure challenges it introduces. This article

How Can You Safeguard Your Personal Data Online and Ensure Privacy?
Infrastructure & Network Security How Can You Safeguard Your Personal Data Online and Ensure Privacy?

In an age where digital footprints are nearly impossible to avoid and personal information is easily accessible, a significant number of Americans are becoming increasingly concerned about their online privacy. According to recent research by NordVPN and Incogni, 152 million Americans now express a

Can CCBA Outperform Traditional Methods in Detecting Web Command Attacks?
Infrastructure & Network Security Can CCBA Outperform Traditional Methods in Detecting Web Command Attacks?

Web command injection attacks are becoming increasingly sophisticated, posing significant security threats to web applications with devastating consequences. Traditional detection methods have proven inadequate for these new, more complex attacks. Researchers at Harbin University have developed an

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later