Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Is Cybersecurity Compromised by Loyalty Over Duty?
Infrastructure & Network Security Is Cybersecurity Compromised by Loyalty Over Duty?

The ongoing debate surrounding the intersection of personal loyalty and national duty has reached new heights, particularly in the realm of cybersecurity. Jen Easterly, a notable former leader of the United States Cybersecurity and Infrastructure Security Agency (CISA), has openly criticized the

Are Data Brokers a Threat to Privacy and Security?
Security Operations & Management Are Data Brokers a Threat to Privacy and Security?

In an age where digital footprints are the norm, the debate over the role and influence of data brokers in personal privacy and security has intensified. These entities can collect, analyze, and sell vast quantities of personal information, often without explicit consent from the individuals

How Can Whistleblower Programs Drive Real Results?
Data Protection & Privacy How Can Whistleblower Programs Drive Real Results?

Rupert Marais, an in-house Security specialist with expertise in cybersecurity strategies, shares valuable insights on the role of whistleblower programs within organizations. As ethics and compliance become increasingly vital across the globe, understanding how to align these programs effectively

How Are Hackers Exploiting Redis to Mine Cryptocurrency?
Infrastructure & Network Security How Are Hackers Exploiting Redis to Mine Cryptocurrency?

In an era where cryptocurrencies have become highly valuable digital assets, cyber attackers are constantly evolving their strategies to exploit vulnerabilities for financial gain. Among these strategies, cryptojacking has emerged as a prevalent threat, capturing the attention of security

Can States Fill Regulatory Gaps in Corporate Oversight?
Data Protection & Privacy Can States Fill Regulatory Gaps in Corporate Oversight?

In a rapidly changing regulatory landscape, the United States is witnessing a growing trend where states are playing a pivotal role in corporate oversight, taking on responsibilities traditionally managed at the federal level. This shift has gained prominence as federal regulatory entities become

Is IRS Modernization Compromising Taxpayer Data Privacy?
Infrastructure & Network Security Is IRS Modernization Compromising Taxpayer Data Privacy?

A brewing conflict between Congressional Democrats and the Internal Revenue Service (IRS) has sparked concerns over potential risks to taxpayer data amid modernization efforts. Central to the controversy is Congressman Gerry Connolly's apprehension about a supposed collaboration involving DOGE

Can a VPN Really Secure Your Public Wi-Fi Browsing?
Infrastructure & Network Security Can a VPN Really Secure Your Public Wi-Fi Browsing?

In today’s digital age, the convenience of public Wi-Fi networks in places like cafes, airports, and hotels often outweighs the perceived risks. Many individuals, engrossed in their daily digital routines, connect to these networks to check emails, scroll through news feeds, or complete casual

Cybersecurity Faces New Threats from Non-Human Identities
Data Protection & Privacy Cybersecurity Faces New Threats from Non-Human Identities

The Hacker News article delves into pressing cybersecurity concerns, focusing on risks associated with Non-Human Identities (NHIs), significant vulnerabilities, supply chain attacks, and emerging threats. NHIs, such as Service Principals and IAM Roles, differ from human identities in authentication

Trend Analysis: Supply Chain Attacks on Open Source
Data Protection & Privacy Trend Analysis: Supply Chain Attacks on Open Source

As businesses and individuals increasingly rely on open-source software, a nefarious trend has emerged: supply chain attacks targeting these indispensable resources. One striking example involves the NPM package 'rand-user-agent,' where a threat actor cunningly published malicious versions to

How Can Small Teams Secure Their Google Workspace Effectively?
Infrastructure & Network Security How Can Small Teams Secure Their Google Workspace Effectively?

In an increasingly digital world, safeguarding cloud work environments becomes crucial, especially for small to midsize businesses. Rupert Marais, an in-house security specialist, shares his insights on fortifying Google Workspace against various threats while balancing productivity and security.

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later