Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Automation and Observability: How I&O Leaders Can Keep Up with the Ever-Changing Business Landscape
IT Digital Transformation
Automation and Observability: How I&O Leaders Can Keep Up with the Ever-Changing Business Landscape

Infrastructure and Operations (I&O) leaders have the challenging task of ensuring that their organizations’ IT systems are running efficiently and effectively. In recent times, with the rise of digital acceleration, coupled with global economic uncertainty, it has become more difficult for I&O leaders to manage their IT systems. This article will explore how I&O leaders can navigate these challenges by

Read More
Why IT Operations Are Taking the Digital Transformation Spotlight
DevOps
Why IT Operations Are Taking the Digital Transformation Spotlight

In today’s digital world, businesses need to thrive in the digital landscape, adapt and change with the latest technologies, and work towards increasing efficiency in their processes. As organizations continue to embark on their digital transformation journeys, they are finding that IT Operations stands alone at the top of the ‘who gets the digital transformation spotlight’ this year. The focus

Read More
Unlocking Business Success: The Critical Role of Clean Code in Software Development
DevOps
Unlocking Business Success: The Critical Role of Clean Code in Software Development

Clean code in software development is a critical aspect that contributes to delivering high-quality products. Implementing clean code principles means ensuring that your development team writes high-quality software that satisfies customer requirements while preventing the accumulation of technical debt. Importance of clean code in software development Clean code is essential in software development as it allows developers to write code

Read More
Transforming the Public Sector: Navigating the Cloud-First Era for Enhanced Efficiency, Security, and Social Value Creation
IT Digital Transformation
Transforming the Public Sector: Navigating the Cloud-First Era for Enhanced Efficiency, Security, and Social Value Creation

The public sector has long been a bastion of stability and continuity, with a reputation for being slow to change. However, recent events have forced state-run organizations to be more agile and responsive to challenges than ever before. The pandemic has triggered a shift towards remote and hybrid working, which has fundamentally changed how the public sector operates. The adoption

Read More
New Android Spyware “BouldSpy” Linked to Iran’s Law Enforcement Command
Cyber Security
New Android Spyware “BouldSpy” Linked to Iran’s Law Enforcement Command

In recent years, cyber espionage has become an increasingly common method of gathering intelligence, and governments worldwide have invested substantial amounts of effort and resources into developing powerful malware strains to facilitate their operations. One such malware strain that has come into the spotlight is BouldSpy. Researchers at the Lookout Threat Lab have recently detected this malicious software and linked

Read More
Navigating the Digital Revolution in Sweden’s Construction Industry: Embracing Standardization, Process Orientation, and Data-Driven Innovation
IT Digital Transformation
Navigating the Digital Revolution in Sweden’s Construction Industry: Embracing Standardization, Process Orientation, and Data-Driven Innovation

The construction industry in Sweden has recently experienced an economic slowdown, which has affected housing construction and other areas of the industry. Klas Antoni, the CIO of Peab group, has commented on the macroeconomic effects of this slowdown, including cost inflation and higher interest rates. In response, Peab group has increased its cost focus and emphasizes investments in IT in

Read More
Unpatched Five-Year-Old Flaw in TBK DVR Devices Actively Exploited by Threat Actors
Cyber Security
Unpatched Five-Year-Old Flaw in TBK DVR Devices Actively Exploited by Threat Actors

Threat actors are taking advantage of an unpatched five-year-old flaw in TBK digital video recording (DVR) devices. The vulnerability, known as CVE-2018-9995, is a critical authentication bypass issue that malicious actors can exploit to gain elevated permissions remotely. Despite the availability of a PoC exploit, there are no fixes that address the vulnerability. CVE-2018-9995 vulnerability affecting TBK DVR devices The

Read More
Unlocking the Potential of Generative AI: Revolutionizing Knowledge Management and Customer Interaction in the Digital Age
IT Digital Transformation
Unlocking the Potential of Generative AI: Revolutionizing Knowledge Management and Customer Interaction in the Digital Age

Digital Transformation (DT) has become a buzzword in the corporate world, signifying a significant shift in the way businesses operate and exchange value. With the advent of new technologies, businesses are exploring innovative ways to leverage them to enhance their operational efficiencies, increase revenue, and improve customer satisfaction. One particular technology that is being widely touted as a game changer

Read More
Achieving Success in the Digital Age: A Holistic Approach to Transformation for CIOs
IT Digital Transformation
Achieving Success in the Digital Age: A Holistic Approach to Transformation for CIOs

As organizations continue to embrace digitalization, CIOs find themselves at the forefront of digital transformation strategies. Despite the best of intentions, however, many CIOs struggle to deliver successful business outcomes from these initiatives. In this article, we will explore the five common challenges that CIOs face in digital transformation efforts. Review of Corporate Boards vs. Organizational Progress in Achieving Digital

Read More
Bridging the Gap: Fostering Effective Collaboration between Developers and Testers for Quality Software Delivery
DevOps
Bridging the Gap: Fostering Effective Collaboration between Developers and Testers for Quality Software Delivery

Developers and testers are two crucial parts of the software development process. They work together to identify and fix bugs, improve performance, and build a successful application. Without a productive partnership between these two, the application can suffer from poor quality and functionality. Thus, it is essential for developers and testers to work in collaboration to produce a reliable and

Read More
Embracing the Future: Key Tech Trends and Investments Reshaping Businesses in 2023
IT Digital Transformation
Embracing the Future: Key Tech Trends and Investments Reshaping Businesses in 2023

The world of technology plays a critical role in shaping the business landscape, especially as the transformative impact of digital technologies continues to unfold. With the rapid pace of technological advancements, it is essential for businesses to stay ahead of the curve by investing in innovative technologies that can help them thrive in the evolving market landscape. In this article,

Read More
A new cloud-based hotel property engagement platform takes the hospitality industry by storm
IT Digital Transformation
A new cloud-based hotel property engagement platform takes the hospitality industry by storm

In the hospitality industry, it is a constant challenge to balance personalized service with streamlined operations. A new cloud-based hotel Property Engagement Platform (PEP), co-developed by Hilton and HotelKey, is making significant strides in addressing this challenge. As the platform powers more than 1,000 properties within the Hilton portfolio, it is quickly gaining traction and enabling hotels to offer seamless

Read More