Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Mastering GDPR Compliance: The Essential Role of Identity Governance and Administration in Today’s Digital Landscape
IT Digital Transformation
Mastering GDPR Compliance: The Essential Role of Identity Governance and Administration in Today’s Digital Landscape

Managing identities and access rights has become crucial to ensuring GDPR compliance in today’s data-driven world. With the shift to cloud computing and the increasing amount of data being stored and shared, organizations must take a strategic approach to identity and access management to secure their sensitive data and ensure compliance with GDPR and other regulations. The Importance of Managing

Read More
Step-By-Step Guide to Deploying a Kubernetes Voting Application Using Azure Cloud Services
DevOps
Step-By-Step Guide to Deploying a Kubernetes Voting Application Using Azure Cloud Services

As technology continues to advance, the demand for efficient application deployment processes is on the rise. One such process is deploying applications onto a Kubernetes cluster. Deploying an application to Kubernetes often involves several steps, including pushing the application’s Docker image to a container registry, creating a Kubernetes cluster, and finally deploying the application on the cluster. This article will

Read More
Guarding Against Cyber espionage: APT28, Malware, and the Importance of Proactive Network Security
Cyber Security
Guarding Against Cyber espionage: APT28, Malware, and the Importance of Proactive Network Security

Cyberattacks on router firmware have significantly increased in recent years, and ‘Jaguar Tooth’ is an example of malware that targets outdated Cisco routers. Reports suggest that the malware can infect routers with the help of a vulnerability exploit by the Advanced Persistent Threat (APT) group known as APT28. Jaguar Tooth leverages this vulnerability to target routers that run an outdated

Read More
Iranian government-backed threat actor “MuddyWater” targets critical infrastructure in the US
Cyber Security
Iranian government-backed threat actor “MuddyWater” targets critical infrastructure in the US

A recent report by Microsoft sheds light on the activities of an Iranian government-backed threat actor known as “Mint Sandstorm.” The group has been identified as being responsible for a series of attacks aimed at critical infrastructure in the US between late 2021 and mid-2022. In this article, we will provide an overview of the threats posed by Mint Sandstorm,

Read More
Docker and Kubernetes Demystified: Revolutionizing Application Deployment and Management
DevOps
Docker and Kubernetes Demystified: Revolutionizing Application Deployment and Management

In recent years, containerization has gained popularity as a powerful tool for software development and deployment. While there are numerous container management platforms available, two of the most popular are Docker and Kubernetes. Both technologies offer unique benefits and applications in the world of microservices development. In this article, we will explore the differences between Docker and Kubernetes, the benefits

Read More
Revolutionizing the Airline Industry: Akasa Air and WebEngage Collaboration to Elevate Customer Engagement and Experience
IT Digital Transformation
Revolutionizing the Airline Industry: Akasa Air and WebEngage Collaboration to Elevate Customer Engagement and Experience

India’s airline industry has been growing rapidly in recent years, and the newest addition to this industry is Akasa Air. Although new, Akasa Air has already established itself as a customer-centric airline with a unique approach to customer satisfaction. Now, in order to further enhance its customer engagement strategy, Akasa Air has partnered with WebEngage, a leading marketing automation platform.

Read More
LockBit Ransomware is now targeting Apple macOS devices
Cyber Security
LockBit Ransomware is now targeting Apple macOS devices

The year 2022 marked a significant increase in the number of ransomware attacks globally. Since then, there has been no respite for individuals and organizations who have continued to fall prey to ransomware groups throughout 2023. With the increase in ransomware attacks, cybercriminals have continued to develop sophisticated and advanced techniques to execute their attacks. One of the known and

Read More
Safeguarding Sensitive Data: Comprehensive Strategies for Enhanced Security and Privacy
Cyber Security
Safeguarding Sensitive Data: Comprehensive Strategies for Enhanced Security and Privacy

Sensitive data exposure can be defined as the unauthorized access, disclosure, or leakage of confidential and private information. This type of security breach is a serious problem for individuals, organizations, and governments globally. Nowadays, sensitive data is at risk of exposure more than ever before. Cybercriminals are becoming more sophisticated, and they have developed several techniques to gain access to

Read More
Navigating the Digital Transformation Ecosystem: Embracing Aligned Technologies, Adaptability, and Digital Trailblazers for Business Success
IT Digital Transformation
Navigating the Digital Transformation Ecosystem: Embracing Aligned Technologies, Adaptability, and Digital Trailblazers for Business Success

In today’s fast-changing business landscape, the term “digital transformation” is increasingly used to describe the process of modernizing and optimizing business operations. However, digital transformation is not just about technology. In fact, it should be viewed as a business transformation that entails the adoption of new processes, resources, and ways of working to provide a better customer and employee experience,

Read More
APT29 Is Actively Targeting NATO, EU, and Africa for Sensitive Information
Cyber Security
APT29 Is Actively Targeting NATO, EU, and Africa for Sensitive Information

Russian hackers, known as APT29 or Cozy Bear and Nobelium, have been increasing their efforts to infiltrate organizations and governments worldwide. Their latest campaign targets NATO, the EU, and African countries to harvest sensitive information using sophisticated data harvesting techniques. The group has been linked to various cyberattacks, including the SolarWinds hack, which affected multiple US federal agencies. This article

Read More
The Future of Decision-Making: How Contextual Decision Intelligence Delivers Data-Driven Results
IT Digital Transformation
The Future of Decision-Making: How Contextual Decision Intelligence Delivers Data-Driven Results

In the modern world, data is the currency that drives businesses and organizations. Every organization today is looking to harness the power of data to make better-informed decisions. However, the question remains, how can data be utilized to make insightful and informed decisions? The answer to this question lies in the adoption of Contextual Decision Intelligence (CDI), a revolutionary technology

Read More
The importance of people in technology transformation
IT Digital Transformation
The importance of people in technology transformation

In today’s fast-paced world, technology is driving change in every aspect of life. Organizations are constantly looking for ways to harness the power of technology to drive growth, efficiency, and customer satisfaction. However, in the race to adopt new technologies, organizations often overlook the most critical component of transformation: their people. The real transformation that organizations seek happens within the

Read More