Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
UK Ministry of Defence Launches “Secure by Design” Initiative to Transform Cybersecurity Approach
Cyber Security
UK Ministry of Defence Launches “Secure by Design” Initiative to Transform Cybersecurity Approach

The UK Ministry of Defence (MoD) has taken a significant step forward in ensuring the safety and integrity of its systems and supply chain with the launch of the Secure by Design initiative. This new approach aims to revolutionize how cybersecurity is integrated into the MoD’s programs, both internally and across its supply chain. By prioritizing security and resilience from

Read More
SpyNote Attacks on Financial Institutions: An In-depth Look into the Malware’s Tactics and Implications
Cyber Security
SpyNote Attacks on Financial Institutions: An In-depth Look into the Malware’s Tactics and Implications

The Android spyware known as SpyNote has become a significant threat to financial institutions since late 2022. This malicious software not only targets these institutions but also expands its capabilities to carry out bank fraud. In this article, we will delve into the distribution techniques employed by SpyNote, the surge in targeted campaigns, its ability to impersonate legitimate applications, and

Read More
Bridging the Digital Divide: An In-Depth Look at the B20 Digital Transformation Taskforce and Its Global Goals
IT Digital Transformation
Bridging the Digital Divide: An In-Depth Look at the B20 Digital Transformation Taskforce and Its Global Goals

The B20 Digital Transformation Task Force is committed to paving the way for a digital future that benefits everyone. With the mission of promoting digital transformation, this task force aims to address the barriers hindering its adoption and bridge the digital divide in order to create an inclusive and empowered society. This article delves into the key areas of focus

Read More
Navigating Business Success: A Comprehensive Guide on Embracing Digital Transformation
IT Digital Transformation
Navigating Business Success: A Comprehensive Guide on Embracing Digital Transformation

In today’s fast-paced and competitive business landscape, digital transformation has emerged as an imperative for organizations to stay relevant and thrive. However, embarking on this transformative journey is not without its challenges. This article aims to provide a comprehensive guide, outlining key factors and strategies for a successful digital transformation. From establishing a clear vision and strategic roadmap to fostering

Read More
Bridging the Digital Gap: The Key Role of Finance-IT Partnership in Achieving Progressive Digital Transformation
IT Digital Transformation
Bridging the Digital Gap: The Key Role of Finance-IT Partnership in Achieving Progressive Digital Transformation

The importance of the partnership between finance and IT in driving successful digital transformation may seem obvious, but recent insights from a Forrester survey of finance and IT executives shed light on persisting challenges. Challenges arising from competing requirements and controls between finance and IT In any organization, the finance and IT departments may seem to have conflicting priorities and

Read More
Demystifying Digital Transformation: The Essential Role of Cloud Professional Services
IT Digital Transformation
Demystifying Digital Transformation: The Essential Role of Cloud Professional Services

In today’s technology-driven world, digital transformation has become a top priority for businesses across industries. To successfully navigate this transformative journey, the role of cloud professional services has taken on greater significance than ever before. These services act as crucial enablers, providing the necessary expertise, resources, and guidance to accelerate digital transformation initiatives. In this article, we will explore the

Read More
Riding the Wave of Digital Transformation: The Rising Role of Cybersecurity & Regulatory Compliance
IT Digital Transformation
Riding the Wave of Digital Transformation: The Rising Role of Cybersecurity & Regulatory Compliance

In today’s digital age, the importance of cybersecurity cannot be overstated. With the increasing connectivity of devices and the growing reliance on technology for everyday tasks, businesses and individuals alike are vulnerable to cyberattacks. This article explores various aspects of cybersecurity and highlights the strategies and solutions that can be employed to protect against threats. AI and ML in Cybersecurity

Read More
Strengthening Web Application Security: Bridging Access Control Vulnerabilities Following New Guidance from Cybersecurity Agencies
Cyber Security
Strengthening Web Application Security: Bridging Access Control Vulnerabilities Following New Guidance from Cybersecurity Agencies

Access control vulnerabilities in web applications pose a significant threat to the security of sensitive data. Recognizing this, the Australian Cyber Security Centre (ACSC), the US Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA) have issued new guidance to alert developers, vendors, and organizations about these risks. In this article, we will delve into the details

Read More
Decoy Dog: A Persistent Remote Access Trojan Likely Leveraged by Nation-State Hackers
Cyber Security
Decoy Dog: A Persistent Remote Access Trojan Likely Leveraged by Nation-State Hackers

Decoy Dog, a remote access Trojan (RAT) based on open-source Pupy malware, has recently undergone significant enhancements, including increased persistence, leading experts to suspect the involvement of nation-state actors. In this article, we will delve into the latest findings regarding Decoy Dog’s capabilities, the cybercrime groups utilizing it, the targeted organizations, and the ongoing threat it poses. Multiple Cybercrime Groups

Read More
First Open Source Software Supply Chain Attacks Targeting the Banking Sector
Cyber Security
First Open Source Software Supply Chain Attacks Targeting the Banking Sector

Open-source software supply chain attacks are posing significant threats to the banking sector. These attacks exploit vulnerabilities in the software supply chain, compromising the security of banks and their customers. Checkmarx, a leading cybersecurity company, has recently identified the first instances of such attacks, highlighting the need for heightened vigilance and robust security measures within the banking industry. First Attack:

Read More
Redefining Business in the Digital Age: A Comprehensive Guide to Digital Transformation 2.0
IT Digital Transformation
Redefining Business in the Digital Age: A Comprehensive Guide to Digital Transformation 2.0

Digital transformation has become a buzzword in recent years, but its roots can be traced back to 2013. Since then, it has undergone numerous iterations and advancements, culminating in the current era of Digital Transformation v2.0. In this article, we will delve into the evolution of digital transformation, the imperative behaviors it entails, the process of exploring and adopting changes,

Read More
Revolutionizing Bank Lending: The Journey towards Digital Transformation and Innovation
IT Digital Transformation
Revolutionizing Bank Lending: The Journey towards Digital Transformation and Innovation

In today’s rapidly evolving technological landscape, digital lending has emerged as a game-changer in the financial industry. Leveraging advanced data analytics, automation, and online platforms, digital lending has streamlined and expedited the loan origination process. This article explores the role of digital loan origination systems and highlights the benefits they offer, such as improved efficiency, speed, and personalized experiences for

Read More