Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Is Shabeel Shah's Move to Obsidian Security a Game Changer for APJ?
Infrastructure & Network Security Is Shabeel Shah's Move to Obsidian Security a Game Changer for APJ?

In the fast-evolving world of cybersecurity, the strategic movements of key personnel can significantly influence a company's trajectory and market position. The recent transition of Shabeel Shah from SentinelOne to Obsidian Security as the senior director of partner sales for the Asia Pacific

Is OpenAI's ChatGPT Violating GDPR with False Accusations?
Security Operations & Management Is OpenAI's ChatGPT Violating GDPR with False Accusations?

The startling revelation that OpenAI's ChatGPT falsely accused a Norwegian man, Arve Hjalmar Holmen, of murder has led to a significant outcry and legal repercussions. This incident has prompted Austrian non-profit organization noyb to file a formal complaint against OpenAI for violating GDPR

Is CrashPlan Endpoints the Best Cloud Backup Solution for Businesses?
Data Protection & Privacy Is CrashPlan Endpoints the Best Cloud Backup Solution for Businesses?

Choosing the right cloud backup service is crucial for businesses looking to protect their data. With many options available, finding a solution that balances ease of use, security, and affordability can be challenging. CrashPlan Endpoints claims to offer an ideal solution for small to medium-sized

AI Adoption Skyrockets Amid Cybersecurity Risks, Report Reveals Challenges
Data Protection & Privacy AI Adoption Skyrockets Amid Cybersecurity Risks, Report Reveals Challenges

Enterprises experience a surge in AI adoption, driven by technological advancements and increasing cybersecurity threats, according to the latest Zscaler report. In a recent report, it was revealed that enterprises have seen a substantial increase in the use of artificial intelligence (AI) and

FortiGate Firewalls Under Attack: Urgent Security Measures Advised
Malware & Threats FortiGate Firewalls Under Attack: Urgent Security Measures Advised

In a concerning development for cybersecurity, Arctic Wolf has issued a critical warning regarding ongoing malicious activities targeting management interfaces of FortiGate firewall devices exposed to the public internet. The attacks, which reportedly started in early December of last year, have

Chinese Espionage Group Hijacks Outdated Juniper Routers for Surveillance
Infrastructure & Network Security Chinese Espionage Group Hijacks Outdated Juniper Routers for Surveillance

The investigation into cybersecurity threats has unveiled a disturbing scheme orchestrated by the Chinese espionage group UNC3886. Utilizing expired Juniper MX routers, these cyber spies have transformed outdated network devices into surveillance hubs, compromising critical infrastructure sectors

Army Reveals Unified Network Plan 2.0 for Zero Trust and Data Security
Infrastructure & Network Security Army Reveals Unified Network Plan 2.0 for Zero Trust and Data Security

As the pace of technological advancement accelerates, the U.S. Army has recognized the pressing need to modernize its network infrastructure, thereby unveiling the Unified Network Plan 2.0. This new iteration not only builds upon the foundational version released in 2021 but also integrates

Akira Ransomware Group Exploits Webcams to Bypass EDR and Encrypt Files
Infrastructure & Network Security Akira Ransomware Group Exploits Webcams to Bypass EDR and Encrypt Files

In 2024, cybercriminals have become increasingly innovative, leveraging more sophisticated techniques to infiltrate corporate networks and evade security measures. Among these malicious actors, the Akira ransomware group stood out, responsible for approximately 15% of the cybersecurity incidents

How Will AI Integration Transform U.S. Military Planning and Operations?
Infrastructure & Network Security How Will AI Integration Transform U.S. Military Planning and Operations?

The U.S. Department of Defense is embarking on a groundbreaking initiative aimed at incorporating artificial intelligence (AI) into military decision-making and operations planning. This represents the integration of AI into the Western defense sector, addressing the outdated methodologies

How Can We Prevent Data Leaks in Slack and Microsoft Teams?
Data Protection & Privacy How Can We Prevent Data Leaks in Slack and Microsoft Teams?

With the rise of remote and hybrid work environments due to the COVID-19 pandemic, collaboration tools like Slack and Microsoft Teams have become essential for maintaining communication among employees. However, the increased use of these tools has also led to growing concerns about data leakage.

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later