Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Embracing the Future: The Role of IoT, Automation and Data Analytics in Modern Manufacturing
IT Digital Transformation
Embracing the Future: The Role of IoT, Automation and Data Analytics in Modern Manufacturing

The manufacturing industry has witnessed a game-changing transformation with the advent of the Internet of Things (IoT). By leveraging interconnected devices and advanced analytics, manufacturers can achieve unprecedented levels of accuracy, efficiency, and safety. This article explores the profound impact of IoT on the manufacturing sector and delves into the opportunities and challenges associated with this digital revolution. Interconnectedness for

Read More
Cyber Attack on Kyivstar by Sandworm: A Devastating Blow to Ukraine’s Critical Infrastructure
Cyber Security
Cyber Attack on Kyivstar by Sandworm: A Devastating Blow to Ukraine’s Critical Infrastructure

The cyber-attack that targeted Ukraine’s mobile operator Kyivstar in December 2023 has been attributed to the notorious Russian hacking group Sandworm. This article delves into the impact of the attack, the activities of the Sandworm group, the specifics of the attack on Kyivstar, the delayed detection, and the potential consequences for Kyivstar, its customers, and Ukraine as a whole. Impact

Read More
SentinelOne Acquires PingSafe to Bolster Cloud-Native Application Protection Capabilities
Cyber Security
SentinelOne Acquires PingSafe to Bolster Cloud-Native Application Protection Capabilities

Cybersecurity giant SentinelOne has announced its plans to acquire PingSafe in a cash-and-stock deal, expanding its product portfolio with the addition of a cloud-native application protection platform (CNAPP) capabilities. This strategic move reflects SentinelOne’s commitment to enhancing its cybersecurity solutions and solidifying its position in the market. Background of the companies SentinelOne is a cybersecurity powerhouse based in Mountain View,

Read More
Xerox Data Breach: A Comprehensive Investigation into the Intrusion
Cyber Security
Xerox Data Breach: A Comprehensive Investigation into the Intrusion

In the world of cybersecurity, no company is immune to the threat of data breaches. Xerox, a renowned multinational corporation, recently fell victim to a breach in its subsidiary, XBS US. The details surrounding the incident are still under investigation, but initial reports indicate that the intrusion was contained within XBS US, mitigating any further escalation. As soon as Xerox

Read More
Amnesty International Confirms Government of India’s Use of Pegasus Spyware to Target Journalists and Opposition
Cyber Security
Amnesty International Confirms Government of India’s Use of Pegasus Spyware to Target Journalists and Opposition

In a concerning revelation, Amnesty International has confirmed what Apple had previously warned about in late October – that the government of India is indeed using the infamous Pegasus spyware to target journalists and the opposition. This revelation comes after Apple cautioned Indian journalists and opposition politicians that their iPhones were continuously targeted in state-sponsored attacks. The Indian government responded

Read More
Hack on AI-Enabled Population Health Management Vendor Impacts Healthcare Clients and Millions of Patients
Cyber Security
Hack on AI-Enabled Population Health Management Vendor Impacts Healthcare Clients and Millions of Patients

A hacking incident at a New Jersey-based vendor of artificial intelligence-enabled population health management services has resulted in a significant breach affecting more than a dozen healthcare clients across the country and nearly 4.5 million of their patients. HealthEC LLP, headquartered in Edison, New Jersey, reported the attack to the U.S. Department of Health and Human Services (HHS) as a

Read More
Operation Triangulation: Unveiling a Sophisticated iOS Cyberespionage Campaign
Cyber Security
Operation Triangulation: Unveiling a Sophisticated iOS Cyberespionage Campaign

In an alarming revelation, security researchers have discovered a previously undocumented hardware feature within Apple’s iPhone System on a Chip (SoC) that allows attackers to exploit multiple vulnerabilities, effectively bypassing hardware-based memory protection. This hardware vulnerability has become a critical component of the Operation Triangulation iOS cyberespionage campaign that has been active since 2019. Let’s delve into the details of

Read More
Revolutionizing In-flight Connectivity: A Deep Dive Into The European Aviation Network in Digital Transformation
IT Digital Transformation
Revolutionizing In-flight Connectivity: A Deep Dive Into The European Aviation Network in Digital Transformation

The European Aviation Network (EAN) has emerged as a game-changing solution, revolutionizing the aviation industry by providing seamless, high-speed connectivity to passengers and crew while in-flight. This hybrid network combines satellite and ground-based technology, offering a cost-effective solution for airlines to offer internet connectivity without relying on expensive satellite-only solutions. Let’s take a closer look at how the EAN works

Read More
Revolutionizing Industrial operations: The Power and Potential of Inmarsat BGAN M2M Communication
IT Digital Transformation
Revolutionizing Industrial operations: The Power and Potential of Inmarsat BGAN M2M Communication

Machine-to-machine (M2M) communication has revolutionized industries across the globe, enabling machines to communicate autonomously without the need for human intervention. Inmarsat BGAN M2M, a cutting-edge satellite-based communication technology, has emerged as a game-changer in this field. In this article, we will explore the significance of Inmarsat BGAN M2M and delve into its various applications across industries. Inmarsat BGAN M2M: An

Read More
Protecting against Threat Actor Activity Targeting the ms-appinstaller Protocol Handler
Cyber Security
Protecting against Threat Actor Activity Targeting the ms-appinstaller Protocol Handler

In recent times, there has been a concerning rise in threat actor activity that exploits the ms-appinstaller protocol handler as an access vector for malware, ultimately leading to the distribution of ransomware. This article sheds light on the vulnerabilities of this protocol handler, the findings from Microsoft Threat Intelligence, the activities of financially motivated threat actors, social engineering techniques employed

Read More
Starlink and Ukraine’s Digital Transformation: Potential Benefits, Challenges and Regulatory Considerations
IT Digital Transformation
Starlink and Ukraine’s Digital Transformation: Potential Benefits, Challenges and Regulatory Considerations

In today’s digital age, access to high-speed internet is crucial for economic growth and development. However, many remote areas in Ukraine continue to suffer from limited connectivity. This is where Starlink, a satellite-based internet service, holds the promise of revolutionizing internet access in the country, providing high-speed, low-latency connectivity even to the most remote regions. Economic Benefits Ukraine, like many

Read More
GitHub Takes Major Step to Fortify Software Supply Chain Security
Cyber Security
GitHub Takes Major Step to Fortify Software Supply Chain Security

In a bold move to strengthen the security of the software supply chain, GitHub, the go-to platform for developers and their code, has launched a decisive initiative. This strategic effort primarily focuses on bolstering the foundational elements of the software ecosystem: the developers themselves. GitHub recognizes their pivotal role in fortifying the entire chain and aims to address the inherent

Read More