Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Navigating the Digital Era: A Step-by-Step Guide for Business Leaders on Successful Digital Transformation
IT Digital Transformation
Navigating the Digital Era: A Step-by-Step Guide for Business Leaders on Successful Digital Transformation

Digital transformation has become a buzzword across industries, highlighting the importance of adopting new technologies and rethinking traditional business practices. This transformation is not just about implementing new technology. It involves a shift in organizational culture, customer experience, and overall business strategy. A successful digital transformation journey requires a well-defined roadmap that outlines a clear vision, goals, and objectives. Importance

Read More
Harnessing the Power of Test Automation in the DevOps Era: Overcoming Challenges and Maximizing Success
DevOps
Harnessing the Power of Test Automation in the DevOps Era: Overcoming Challenges and Maximizing Success

The world of web applications is continuously evolving and growing, and catering to users’ needs can be an overwhelming task. It has become increasingly important to create user-friendly, high-quality web applications that meet users’ expectations. With the increasing competition, companies need to ensure that every feature of the application works flawlessly before launching it into the market. This is where

Read More
Hidden Threats: FleckPe Malware Breaches Google Play Store in Disguise, Exposing Thousands to Fleeceware Dangers
Cyber Security
Hidden Threats: FleckPe Malware Breaches Google Play Store in Disguise, Exposing Thousands to Fleeceware Dangers

As smartphones have become an increasingly essential part of modern life, so too has the threat of malware. Fleckpe is the latest example of sneaky software designed to harm unsuspecting users. Disguised as a variety of photo editing and camera apps, Fleckpe has amassed over 620,000 downloads in total since its first appearance on the Google Play Store in 2022.

Read More
Automation and Observability: How I&O Leaders Can Keep Up with the Ever-Changing Business Landscape
IT Digital Transformation
Automation and Observability: How I&O Leaders Can Keep Up with the Ever-Changing Business Landscape

Infrastructure and Operations (I&O) leaders have the challenging task of ensuring that their organizations’ IT systems are running efficiently and effectively. In recent times, with the rise of digital acceleration, coupled with global economic uncertainty, it has become more difficult for I&O leaders to manage their IT systems. This article will explore how I&O leaders can navigate these challenges by

Read More
Why IT Operations Are Taking the Digital Transformation Spotlight
DevOps
Why IT Operations Are Taking the Digital Transformation Spotlight

In today’s digital world, businesses need to thrive in the digital landscape, adapt and change with the latest technologies, and work towards increasing efficiency in their processes. As organizations continue to embark on their digital transformation journeys, they are finding that IT Operations stands alone at the top of the ‘who gets the digital transformation spotlight’ this year. The focus

Read More
Unlocking Business Success: The Critical Role of Clean Code in Software Development
DevOps
Unlocking Business Success: The Critical Role of Clean Code in Software Development

Clean code in software development is a critical aspect that contributes to delivering high-quality products. Implementing clean code principles means ensuring that your development team writes high-quality software that satisfies customer requirements while preventing the accumulation of technical debt. Importance of clean code in software development Clean code is essential in software development as it allows developers to write code

Read More
Transforming the Public Sector: Navigating the Cloud-First Era for Enhanced Efficiency, Security, and Social Value Creation
IT Digital Transformation
Transforming the Public Sector: Navigating the Cloud-First Era for Enhanced Efficiency, Security, and Social Value Creation

The public sector has long been a bastion of stability and continuity, with a reputation for being slow to change. However, recent events have forced state-run organizations to be more agile and responsive to challenges than ever before. The pandemic has triggered a shift towards remote and hybrid working, which has fundamentally changed how the public sector operates. The adoption

Read More
New Android Spyware “BouldSpy” Linked to Iran’s Law Enforcement Command
Cyber Security
New Android Spyware “BouldSpy” Linked to Iran’s Law Enforcement Command

In recent years, cyber espionage has become an increasingly common method of gathering intelligence, and governments worldwide have invested substantial amounts of effort and resources into developing powerful malware strains to facilitate their operations. One such malware strain that has come into the spotlight is BouldSpy. Researchers at the Lookout Threat Lab have recently detected this malicious software and linked

Read More
Navigating the Digital Revolution in Sweden’s Construction Industry: Embracing Standardization, Process Orientation, and Data-Driven Innovation
IT Digital Transformation
Navigating the Digital Revolution in Sweden’s Construction Industry: Embracing Standardization, Process Orientation, and Data-Driven Innovation

The construction industry in Sweden has recently experienced an economic slowdown, which has affected housing construction and other areas of the industry. Klas Antoni, the CIO of Peab group, has commented on the macroeconomic effects of this slowdown, including cost inflation and higher interest rates. In response, Peab group has increased its cost focus and emphasizes investments in IT in

Read More
Unpatched Five-Year-Old Flaw in TBK DVR Devices Actively Exploited by Threat Actors
Cyber Security
Unpatched Five-Year-Old Flaw in TBK DVR Devices Actively Exploited by Threat Actors

Threat actors are taking advantage of an unpatched five-year-old flaw in TBK digital video recording (DVR) devices. The vulnerability, known as CVE-2018-9995, is a critical authentication bypass issue that malicious actors can exploit to gain elevated permissions remotely. Despite the availability of a PoC exploit, there are no fixes that address the vulnerability. CVE-2018-9995 vulnerability affecting TBK DVR devices The

Read More
Unlocking the Potential of Generative AI: Revolutionizing Knowledge Management and Customer Interaction in the Digital Age
IT Digital Transformation
Unlocking the Potential of Generative AI: Revolutionizing Knowledge Management and Customer Interaction in the Digital Age

Digital Transformation (DT) has become a buzzword in the corporate world, signifying a significant shift in the way businesses operate and exchange value. With the advent of new technologies, businesses are exploring innovative ways to leverage them to enhance their operational efficiencies, increase revenue, and improve customer satisfaction. One particular technology that is being widely touted as a game changer

Read More
Achieving Success in the Digital Age: A Holistic Approach to Transformation for CIOs
IT Digital Transformation
Achieving Success in the Digital Age: A Holistic Approach to Transformation for CIOs

As organizations continue to embrace digitalization, CIOs find themselves at the forefront of digital transformation strategies. Despite the best of intentions, however, many CIOs struggle to deliver successful business outcomes from these initiatives. In this article, we will explore the five common challenges that CIOs face in digital transformation efforts. Review of Corporate Boards vs. Organizational Progress in Achieving Digital

Read More