Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Unlocking the Potential of Digital Transformation: Overcoming Obstacles and Empowering Public Sector Innovation
IT Digital Transformation
Unlocking the Potential of Digital Transformation: Overcoming Obstacles and Empowering Public Sector Innovation

Digital transformation, like any innovation, has its own set of challenges that require addressing. The public sector, being a slow-moving sector, has also faced these challenges. The sector is still struggling to catch up with the digital era in which we live. However, with the growing need to make services more efficient and accessible to citizens, digital transformation has become

Read More
New Research Finds UAVs Vulnerable to Electromagnetic Fault Injection (EMFI) Attacks
Cyber Security
New Research Finds UAVs Vulnerable to Electromagnetic Fault Injection (EMFI) Attacks

Recent years have seen a significant increase in the use of unmanned aerial vehicles (UAVs) across a wide range of industries, from agriculture to law enforcement. While UAVs offer numerous benefits, including cost savings, improved safety, and greater efficiency, their increased use has also made them a target for cyberattacks. Now, new research from cybersecurity firm IOActive has found that

Read More
UNC3886: Chinese Cyberespionage Group Targets VMware ESXi Systems with Zero-Day Vulnerability Exploitation
Cyber Security
UNC3886: Chinese Cyberespionage Group Targets VMware ESXi Systems with Zero-Day Vulnerability Exploitation

Mandiant, a cybersecurity company, has recently identified the Chinese cyber espionage group UNC3886 exploiting a zero-day vulnerability in the VMware ESXi hypervisor to escalate privileges on guest virtual machines. The group has been observed deploying malicious vSphere Installation Bundles (VIBs) on ESXi hypervisors to gain command execution, file manipulation, and reverse shell capabilities. UNC3886 is known for targeting technology, defense,

Read More
Mastering Logic and Testing: Empowering Efficiency in Software Development
DevOps
Mastering Logic and Testing: Empowering Efficiency in Software Development

It’s a fact that many developers often focus solely on satisfying system requirements or developing a feature’s functionality, without thoroughly examining and testing it. However, in the software system, ignoring the testing phase can have several detrimental effects. Tests help to identify faults, ensure features function as intended, and validate implementation. They form a crucial part of the development process

Read More
The UK government pledges £10m for medical technology projects aimed at treating cancer, Alzheimer’s, and stroke
IT Digital Transformation
The UK government pledges £10m for medical technology projects aimed at treating cancer, Alzheimer’s, and stroke

The UK government has pledged £10m to support five new medical technology projects that aim to aid doctors in the effective treatment of diseases such as cancer, Alzheimer’s, and stroke. The funding, which was announced on Monday, will go towards developing medical technologies that will help doctors speed up diagnosis and personalize treatment. The projects will utilize novel digital and

Read More
Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online
Cyber Security
Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online

Obsidian is a cybersecurity firm specializing in providing protection to individuals and businesses against all forms of cyber threats. Recently, they documented a successful ransomware attack on Sharepoint Online (Microsoft 365). The attack was carried out by hackers exploiting a Microsoft Global SaaS admin account, deviating from the standard compromised endpoint method. The victim sought assistance from Obsidian’s product and

Read More
Keytrade Bank moves to cloud-based core banking technology with Infosys Finacle
IT Digital Transformation
Keytrade Bank moves to cloud-based core banking technology with Infosys Finacle

Keytrade Bank, an online bank based in the Benelux region, has announced its transition from legacy core banking technology to a modern, cloud-based platform. In this article, we will examine the details of this transition, the reasons behind it, and the potential impact it may have on Keytrade Bank and the broader banking industry. Keytrade Bank’s legacy core banking system

Read More
Edge Computing and Containers — Innovative Solutions to Modern Challenges
DevOps
Edge Computing and Containers — Innovative Solutions to Modern Challenges

Edge computing and containers have become increasingly popular in recent times, providing innovative solutions to various challenges related to data processing in our daily lives. Edge computing refers to a distributed computing model where data processing is done on local devices at the edge of the network, closer to where the data is generated. Containers, on the other hand, are

Read More
Cybersecurity Firm Blackpoint Cyber Secures $190 Million to Elevate Advanced Security Offerings
Cyber Security
Cybersecurity Firm Blackpoint Cyber Secures $190 Million to Elevate Advanced Security Offerings

As cyber threats continue to evolve at an alarming rate, businesses of all sizes are increasingly looking for ways to enhance their cybersecurity posture. To meet this demand, cybersecurity companies are continually developing new products and services to address emerging threats. One of these companies is Blackpoint Cyber, which has just raised an impressive $190 million in a growth funding

Read More
Unleashing the Full Potential of Containerization: Effective Container Management for Successful Cloud-Native Adoption
DevOps
Unleashing the Full Potential of Containerization: Effective Container Management for Successful Cloud-Native Adoption

Containers have become a popular choice for enterprise organizations looking to move their legacy applications to the cloud or break monolithic applications into microservices. Along with these benefits, containers also provide portability and scalability advantages, making them invaluable tools for DevOps teams. However, managing containers goes beyond just building and running images and requires a strategic approach to ensure their

Read More
Navigating the Digital Battlefield: Protecting Your Business from Modern Cyber Threats
Cyber Security
Navigating the Digital Battlefield: Protecting Your Business from Modern Cyber Threats

With technology playing an increasingly critical role in today’s business landscape, the risk of cyber threats has become a reality. Cyberattacks continue to be a primary concern for businesses, as hackers relentlessly look for ways to infiltrate company networks and steal sensitive information. With the rising costs of cybercrime, it is essential for businesses to develop a comprehensive cybersecurity plan

Read More
JetBrains updates Aqua IDE for test automation with Playwright and Cypress support
DevOps
JetBrains updates Aqua IDE for test automation with Playwright and Cypress support

JetBrains, the software development company behind popular development tools such as IntelliJ IDEA and Kotlin, has announced an update to its testing automation IDE, Aqua. The update emphasizes new support for the Playwright and Cypress test frameworks and debugging. Aqua was introduced in November 2021 and is still in preview form. It aims to offer software developers a way to

Read More