Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
How Did Andariel APT Breach South Korean Sectors?
Cyber Security
How Did Andariel APT Breach South Korean Sectors?

The Andariel APT group has significantly escalated its malicious activities with a concerted cyber-attack campaign targeting various sectors in South Korea. The newly discovered malware tool at the core of this campaign, the Nestdoor Remote Access Trojan (RAT), allows for an unprecedented level of access and control over compromised systems. With functionalities that include file transfer, command execution, and shell

Read More
How Are SAP Users Embracing S/4HANA and AI for Digital Transformation?
IT Digital Transformation
How Are SAP Users Embracing S/4HANA and AI for Digital Transformation?

The landscape of enterprise software is witnessing a radical transformation as businesses seek competitive advantages through digital innovation. At the heart of this transformation is the drive to adopt the latest technologies such as SAP’s S/4HANA and Artificial Intelligence (AI). As companies come to the realization that the end of mainstream maintenance for SAP Business Suite 7 in 2027 is

Read More
How Will 5G Drones Transform Mountain Rescue Ops?
IT Digital Transformation
How Will 5G Drones Transform Mountain Rescue Ops?

In the vast wilderness of Scotland’s Angus hills, where mobile coverage is often a gamble, an innovative trial is unfolding that could redefine the protocols of mountain rescue operations. Here, the unpredictable terrain has made the use of drones invaluable for scanning the landscape and locating persons in distress. By equipping these drones with 5G technology, rescuers can potentially overcome

Read More
Are Outdated D-Link Routers a Cybersecurity Threat?
Cyber Security
Are Outdated D-Link Routers a Cybersecurity Threat?

In a move aimed at securing federal information systems, the United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a strong warning concerning critical vulnerabilities detected in D-Link routers. Among these, the CVE-2014-10005 exploit in DIR-600 series routers first discovered in 2014 poses an immediate risk, as these cross-site request forgery (CSRF) vulnerabilities can be easily exploited. Alarming as

Read More
Is Your Wi-Fi Connection Safe from the WrongNet Flaw?
Cyber Security
Is Your Wi-Fi Connection Safe from the WrongNet Flaw?

In the interconnected space where wireless fidelity, or Wi-Fi, reigns supreme, a worrying vulnerability has surfaced contrary to the expected fortress of encryption. CVE-2023-52424 is a new chink in the armor of the IEEE 802.11 standard, causing alarm among network security experts. WPA2 and WPA3, protocols designed for securing Wi-Fi networks, have a gaping loophole: the SSID, the identifier for

Read More
How Are Telcos Evolving Into Techcos with AI and Cloud?
IT Digital Transformation
How Are Telcos Evolving Into Techcos with AI and Cloud?

The telecommunications industry stands at the brink of a major overhaul, where traditional services like voice and SMS are getting overshadowed by the rising demand for data-centric offerings. As telcos transform into techcos, they are embedding AI and cloud into the core of their operations, unlocking an array of capabilities that are fundamental to staying competitive in a digital era.

Read More
How Can Companies Succeed in Digital Transformation?
IT Digital Transformation
How Can Companies Succeed in Digital Transformation?

The journey of digital transformation is akin to navigating uncharted technological waters, where success is as much about avoiding pitfalls as it is about advancing towards a digital horizon. With an estimated failure rate of 70% reported by McKinsey, the stakes are high, and the need for a well-charted course is clear. This article presents strategic insights and actionable tactics

Read More
How Can Unified SOCs Strengthen Critical Infrastructure Security?
DevOps
How Can Unified SOCs Strengthen Critical Infrastructure Security?

As digital transformation accelerates, the intersection of Information Technology (IT) and Operational Technology (OT) is increasingly becoming a primary target for cyber threats. Systems that manage critical services such as electricity, water, transportation, and healthcare are constantly at risk, reinforcing the imperative for robust cybersecurity measures. Leading experts in the field, like Microsoft’s David Atch, alarmingly point out that the

Read More
How Will China’s Digital Shift Revitalize Manufacturing?
IT Digital Transformation
How Will China’s Digital Shift Revitalize Manufacturing?

China’s manufacturing sector, long considered the world’s factory, is poised for a transformative shift through digital integration. The State Council’s commitment to revamp the industry is a testament to the government’s recognition of the dynamism digital technologies bring. This strategic move dovetails with the global trend of Industry 4.0, where automation and data are reshaping production landscapes. China’s directive is

Read More
How is AI Revolutionizing DevOps Efficiency?
DevOps
How is AI Revolutionizing DevOps Efficiency?

The realm of software development and operations, collectively known as DevOps, is undergoing a significant transformation thanks to the integration of artificial intelligence (AI). The combination of these technologies has given birth to a new paradigm that’s reshaping the way development and operation teams interact with their tooling, infrastructure, and each other. By harnessing the power of AI, DevOps processes

Read More
Is Rocky Linux 9.4 the New Go-To for DevOps Pros?
DevOps
Is Rocky Linux 9.4 the New Go-To for DevOps Pros?

The Linux distribution landscape is ever-evolving, with many distros jostling to fill the void left by CentOS’s shift in strategy. Not least among them is Rocky Linux, particularly its latest release, version 9.4. This iteration seems tailor-made for the DevOps community, offering robustness and cutting-edge features that rival top-tier enterprise solutions like Red Hat Enterprise Linux (RHEL). But does Rocky

Read More
How Will Emerging Tech Shape Future Business Networks?
IT Digital Transformation
How Will Emerging Tech Shape Future Business Networks?

The pace of change in technology today is exponential. With each leap forward, business networks face pressure to adapt, supporting the rapid incline in data consumption, processing demands, and new forms of connectivity. Below we dive into the effects of specific emerging technologies and how they are poised to redefine the future of business infrastructure. The Rise of the Metaverse

Read More