Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Is Shadow AI Driving the Surge in Insider Risk Costs?
Identity & Access Management Is Shadow AI Driving the Surge in Insider Risk Costs?

Rupert Marais is a leading authority in the field of endpoint security and cybersecurity strategy, currently serving as an in-house specialist focused on the intersection of human behavior and digital risk. With years of experience managing complex network infrastructures, he has witnessed

Will Anthropic’s Claude Code Security Disrupt Cybersecurity?
Infrastructure & Network Security Will Anthropic’s Claude Code Security Disrupt Cybersecurity?

The collective gasp of a global investor class usually follows a black swan event, yet the simple release of a technical documentation update by Anthropic managed to erase billions in valuation from established security firms in mere minutes. When the curtain pulled back on Claude Code Security,

Keenadu Malware Infects Android Devices via Supply Chain Attacks
Endpoint & Device Security Keenadu Malware Infects Android Devices via Supply Chain Attacks

Rupert Marais is a leading security specialist at the forefront of endpoint and device protection, focusing on the intricate vulnerabilities within mobile ecosystems and firmware integrity. With extensive experience in managing complex network threats and developing robust cybersecurity strategies,

INTERPOL Arrests 651 in Major African Cybercrime Crackdown
Endpoint & Device Security INTERPOL Arrests 651 in Major African Cybercrime Crackdown

Digital predators operating from the shadows of the internet have found that their borderless schemes are no longer beyond the reach of a unified global police force. Operation Red Card 2.0 represents a monumental shift in how international law enforcement addresses the surge of high-yield

Why Is Massiv the Next Big Threat to Mobile Banking?
Endpoint & Device Security Why Is Massiv the Next Big Threat to Mobile Banking?

The rapid convenience of managing finances from the palm of one’s hand has created an unprecedented attack surface, transforming every smartphone into a potential gateway for sophisticated financial fraud. As mobile banking becomes the default platform for millions, a new generation of malware is

Chinese Hackers Prep US Grid for Destructive Attacks
Infrastructure & Network Security Chinese Hackers Prep US Grid for Destructive Attacks

A deeply concerning annual threat report has unveiled a calculated and alarming strategic pivot by state-sponsored cyber actors, indicating that Chinese-linked hacking groups are systematically embedding themselves within United States critical infrastructure not for espionage, but to prepare for

Stolen Eurail Customer Data Appears for Sale Online
Data Protection & Privacy Stolen Eurail Customer Data Appears for Sale Online

The excitement of a European rail journey, once a cherished memory of scenic landscapes and cultural discovery, has been overshadowed by the chilling reality that the personal data of millions of travelers is now a commodity on cybercrime forums. What began as a dream vacation for many has evolved

Microsoft Exchange Bug Blocks Legitimate Emails
Data Protection & Privacy Microsoft Exchange Bug Blocks Legitimate Emails

An essential tool for modern business communication is faltering as a significant bug within Microsoft's Exchange Online service has been incorrectly flagging and quarantining legitimate emails, causing widespread disruption for an unspecified number of customers. The issue, which began on February

Password Manager Security – Review
Identity & Access Management Password Manager Security – Review

While designed as the ultimate bastion for our sprawling digital identities, the very concentration of our most sensitive credentials into a single digital vault transforms password managers into uniquely high-value targets for malicious actors. Password managers represent a significant advancement

Have You Patched the Latest Chrome Zero-Day?
Malware & Threats Have You Patched the Latest Chrome Zero-Day?

With us today is Rupert Marais, our in-house security specialist, to break down the realities of modern web browser security in light of the recently disclosed, actively exploited zero-day vulnerability in Google Chrome. We'll explore the mechanics of this high-severity 'use-after-free' flaw,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later