Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Standing Privilege: A Growing Threat to IT Security
Identity & Access Management Standing Privilege: A Growing Threat to IT Security

In the intricate and rapidly shifting world of IT security, a subtle yet profoundly dangerous issue has emerged as a critical concern for organizations worldwide: the persistent access rights known as standing privilege. These always-on permissions, often granted to users or systems without a

Klopatra Banking Trojan – Review
Endpoint & Device Security Klopatra Banking Trojan – Review

Imagine waking up to find your bank account drained, with no trace of suspicious activity on your phone overnight, a chilling reality that is becoming all too common for Android users in regions like Italy and Spain due to a stealthy menace known as the Klopatra Banking Trojan. Emerging as a

Why Are 50,000 Cisco Firewalls Still Vulnerable to Exploits?
Infrastructure & Network Security Why Are 50,000 Cisco Firewalls Still Vulnerable to Exploits?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. With a deep understanding of the evolving threat landscape, Rupert is the perfect person to shed light on the

How Does DarkCloud Infostealer Threaten Your Data Security?
Infrastructure & Network Security How Does DarkCloud Infostealer Threaten Your Data Security?

In an era where digital transactions and online interactions dominate daily life, the emergence of sophisticated malware like DarkCloud Infostealer poses a grave risk to personal and organizational data security, demanding urgent attention and robust defenses. Recently relaunched as version 4.2,

SonicWall SSL VPN Under Siege by Akira Ransomware Actors
Identity & Access Management SonicWall SSL VPN Under Siege by Akira Ransomware Actors

What happens when a trusted shield becomes the very gateway for chaos? In the realm of cybersecurity, SonicWall SSL VPN appliances, long relied upon for secure remote access, have turned into prime targets for a ruthless adversary: the Akira ransomware group. Since late July, these devices have

Can the UN Shape Global AI Safety and Trust Standards?
Malware & Threats Can the UN Shape Global AI Safety and Trust Standards?

The Global Landscape of AI Development and Governance In a world increasingly driven by artificial intelligence, the technology's rapid expansion has transformed industries, economies, and societies at an unprecedented pace, raising critical questions about governance and safety on a global scale.

WordPress Faces Rising Threats from ClickFix and TDS Attacks
Identity & Access Management WordPress Faces Rising Threats from ClickFix and TDS Attacks

In the ever-evolving digital realm, WordPress stands as the backbone of countless websites, commanding an impressive 60.8% market share among content management systems (CMS), and its ubiquity makes it an irresistible target for cybercriminals. Powering everything from personal blogs to sprawling

Is Corporate Influence Undermining RubyGems' Open Source?
Security Operations & Management Is Corporate Influence Undermining RubyGems' Open Source?

Fixed version: In the vibrant world of open-source software, where collaboration and trust reign supreme, a seismic rift has emerged within the Ruby programming community, shaking the very foundation of its ethos. Picture a cornerstone of this ecosystem—RubyGems, the vital package manager powering

Delinea Unveils Free MCP Server to Secure AI Credentials
Infrastructure & Network Security Delinea Unveils Free MCP Server to Secure AI Credentials

In an era where artificial intelligence is transforming workplace dynamics, a staggering reality emerges: many AI tools, integral to business operations, often access sensitive systems with credentials embedded in plain text, leaving organizations vulnerable to breaches. As AI agents become

Are Payment Iframes Your Biggest Security Blind Spot?
Data Protection & Privacy Are Payment Iframes Your Biggest Security Blind Spot?

Imagine a scenario where a seemingly secure online checkout page, trusted by thousands of customers, becomes the perfect trap for stealing credit card data, as sophisticated attackers have evolved their methods to exploit payment iframes. They bypass traditional security measures with pixel-perfect

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later