Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Can Singaporean Companies Balance DeepSeek's Benefits and Risks?
Data Protection & Privacy Can Singaporean Companies Balance DeepSeek's Benefits and Risks?

In recent times, companies in Singapore find themselves weighing the benefits against the potential risks of adopting the Chinese generative artificial intelligence (AI) model known as DeepSeek. This consideration comes against the backdrop of DeepSeek's recent breakthrough, which promises

Senators Question Google and Amazon Over Ads On CSAM-Hosting Sites
Security Operations & Management Senators Question Google and Amazon Over Ads On CSAM-Hosting Sites

Recent actions by US Senators Marsha Blackburn and Richard Blumenthal have brought to light significant concerns regarding the advertising practices of tech giants Amazon and Google. The senators have written letters to the CEOs of these companies, questioning their ad businesses' involvement

What Lessons Can Be Learned from 14 Years of systemd Development?
Security Operations & Management What Lessons Can Be Learned from 14 Years of systemd Development?

The development of systemd over the past 14 years has been a journey marked by innovation, controversy, and significant impact on the Linux ecosystem. This article delves into the key lessons learned from its evolution, as highlighted by Lennart Poettering during his talk at FOSDEM 2025. By

Which Antivirus is Better: McAfee Total Protection or Norton 360 Deluxe?
Malware & Threats Which Antivirus is Better: McAfee Total Protection or Norton 360 Deluxe?

In today’s digital age, cybersecurity is a paramount concern for users worldwide, making the choice of antivirus software a critical decision. Two prominent names that consistently emerge when discussing robust cybersecurity solutions are McAfee Total Protection and Norton 360 Deluxe. Established a

AT&T Sues Broadcom Over Massive 1,050% Price Hike for VMware Support
Security Operations & Management AT&T Sues Broadcom Over Massive 1,050% Price Hike for VMware Support

AT&T recently filed a lawsuit against Broadcom, alleging a massive 1,050 percent price increase for VMware support services over a proposed five-year deal. The telecommunications giant claims that this hike does not align with any reasonable expectation from long-time strategic partners, citing

Nvidia and Cisco Lead Efforts to Enhance AI Security and Reliability
Data Protection & Privacy Nvidia and Cisco Lead Efforts to Enhance AI Security and Reliability

Artificial Intelligence (AI) technology has seen rapid advancements, but with these advancements come significant risks. Recognizing the dual nature of AI, tech giants Nvidia and Cisco have introduced innovative tools aimed at enhancing AI security and performance. This article delves into their

Can Generative AI Systems Ever Be Fully Secured Against Threats?
Data Protection & Privacy Can Generative AI Systems Ever Be Fully Secured Against Threats?

The rapid advancement of generative AI systems has brought about significant benefits across various industries. However, with these advancements come inherent security risks that pose serious challenges. A recent study by Microsoft’s team of experts delves into these issues, highlighting the c

New Kubernetes Vulnerability CVE-2024-9042 Fixed in Latest Update
Security Operations & Management New Kubernetes Vulnerability CVE-2024-9042 Fixed in Latest Update

A critical security issue within the Kubernetes platform has recently been addressed, bringing attention to the ever-evolving landscape of cybersecurity. This vulnerability, tracked as CVE-2024-9042, was discovered by Akamai researcher Tomer Peled. It enables remote attackers to execute code with

How Does the PCCR Model Address Modern Border Security Challenges?
Malware & Threats How Does the PCCR Model Address Modern Border Security Challenges?

Modern border security is a complex and multifaceted issue that requires a comprehensive and adaptive approach. The PCCR (Prevention, Containment, Concretion, and Reaction) model offers a sophisticated framework to address these challenges effectively. This article delves into the intricacies of

Rise in Ransomware Resilience: Firms Reject Extortion Demands
Malware & Threats Rise in Ransomware Resilience: Firms Reject Extortion Demands

Cybercriminals wielding ransomware have found a lucrative trade in the past, locking down organizational data and demanding hefty sums for its release. However, there's an evolving tide in the cybersecurity landscape: a growing resistance among victimized firms to succumb to extortion. This

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later