Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Are You Ready for the Latest AI-Enhanced Cybersecurity Threats?
Cyber Security
Are You Ready for the Latest AI-Enhanced Cybersecurity Threats?

The cybersecurity landscape is evolving at a rapid pace, and the introduction of AI-enhanced threats is posing new challenges for organizations worldwide. Threat actors are constantly improving their tactics, making it essential for security professionals to understand the scope and nature of these AI-driven threats. Staying ahead requires a comprehensive understanding of these threats and adopting robust defenses. AI’s Dual

Read More
How Are Malicious Drivers Escalating Modern Ransomware Attacks?
Cyber Security
How Are Malicious Drivers Escalating Modern Ransomware Attacks?

In what has become a significant threat to cybersecurity, modern ransomware campaigns are increasingly employing malicious drivers to heighten their attacks. A notable example is the Medusa ransomware, which has utilized a harmful driver known as ABYSSWORKER to target organizations by disrupting and removing Endpoint Detection and Response (EDR) products. This new tactic represents a shift in the methods used

Read More
How Will Australia Tackle Digital Transformation and Skill Gaps?
IT Digital Transformation
How Will Australia Tackle Digital Transformation and Skill Gaps?

The recent federal election put a spotlight on Australia’s urgent need to address digital transformation and skill gaps. As businesses and educational institutions navigate these changes, they face significant challenges and opportunities. Brad Pulford, Managing Director of HP Australia and New Zealand, and Brett Salakas, HP’s Education Ambassador, highlight the importance of adopting new technologies and reforming educational systems. There

Read More
Stablecoins: Revolutionizing Finance and Bridging Blockchain and Tradition
IT Digital Transformation
Stablecoins: Revolutionizing Finance and Bridging Blockchain and Tradition

Stablecoins have emerged as a transformative force in the global financial system, promising innovation and efficiency. Understanding how they are reshaping traditional finance and recognizing the infrastructure needed to support them is crucial in this new financial era. These unique digital currencies are poised to redefine the financial landscape by offering the stability and security needed for a more integrated

Read More
Air New Zealand and TCS Partner to Lead Digital Transformation in Aviation
IT Digital Transformation
Air New Zealand and TCS Partner to Lead Digital Transformation in Aviation

Air New Zealand has embarked on a significant digital transformation initiative through a strategic five-year partnership with Tata Consultancy Services (TCS). Announced at a ceremony in Mumbai, this collaboration aims to place artificial intelligence (AI) at the core of the airline’s operations. With high-profile attendees such as New Zealand Prime Minister Christopher Luxon and Tata Group Chairman Natarajan Chandrasekaran, the

Read More
Can Citizen Conan Effectively Combat South Korea’s Phone Phishing Scams?
Cyber Security
Can Citizen Conan Effectively Combat South Korea’s Phone Phishing Scams?

As the sophistication of phone-based phishing scams escalates in South Korea, an increasing number of citizens have turned to “Citizen Conan,” an anti-phishing application developed by the National Police Agency and InfiniGroo. This app is designed to assist users in identifying malicious applications and smishing attempts, common tactics in voice phishing schemes. In February, the app witnessed a remarkable 215.9%

Read More
Are AI-Driven Phishing Attacks Making Your Browser Vulnerable?
Cyber Security
Are AI-Driven Phishing Attacks Making Your Browser Vulnerable?

The dramatic surge in browser-based phishing attacks has become a significant concern for both individuals and enterprises alike. These attacks have seen a sharp 140% year-over-year increase, recording 752,000 incidents in the past year. This alarming rise has been primarily attributed to the usage of AI-driven phishing techniques and the exploitation of enterprise browsers. A report by Menlo Security identifies

Read More
What’s New in Kali Linux 2025.1a for Cybersecurity Professionals?
Cyber Security
What’s New in Kali Linux 2025.1a for Cybersecurity Professionals?

Kali Linux, a household name among cybersecurity professionals, has launched its latest iteration: Kali Linux 2025.1a. This significant update brings a range of enhancements, tools, and improvements, reaffirming its commitment to offering a robust and dynamic platform for security experts and enthusiasts. A critical aspect of this release is the “a” designation, indicating a prompt rebuild to resolve a last-minute

Read More
Urgent: Fake Browser Updates Spreading RansomHub via Compromised Sites
Cyber Security
Urgent: Fake Browser Updates Spreading RansomHub via Compromised Sites

A new development in the cybersecurity sphere has raised alarms as ransomware attacks exploit compromised websites to infect users with RansomHub. This sophisticated cyber attack utilizes legitimate-looking browser update notifications to trick users into downloading malicious software. The attackers behind SocGholish have taken to infiltrating reputable websites, modifying them to serve dangerous JavaScript payloads to unsuspecting visitors. The infection vector

Read More
Google Acquires Wiz for $32B, Emphasizes AI-Driven Cloud Security
Cyber Security
Google Acquires Wiz for $32B, Emphasizes AI-Driven Cloud Security

Google’s acquisition of Wiz, a cloud security startup, marks a significant development in the competitive cloud computing industry. By highlighting cybersecurity and digital trust as essential components, this $32 billion deal underscores Google’s commitment to enhancing the security landscape of the cloud ecosystem. This strategic move promises to make substantial waves in market dynamics and sets the stage for future

Read More
Overcoming Hurdles: Embracing Digital Transformation in Construction
IT Digital Transformation
Overcoming Hurdles: Embracing Digital Transformation in Construction

The construction sector has been notoriously slow to embrace digital transformation, even as industries around the globe have raced towards digitalization. These hurdles include budget constraints, organizational resistance to change, and significant gaps in leadership knowledge. Despite recognizing the benefits, many senior decision-makers in the construction supply chain find it difficult to align their eCommerce strategies with broader business objectives.

Read More
How Did a GitHub Action Compromise Impact Thousands of Repositories?
DevOps
How Did a GitHub Action Compromise Impact Thousands of Repositories?

A significant security incident has rocked the software development community, specifically targeting GitHub Actions. This breach, identified as CVE-2025-30066, was a supply chain attack affecting over 23,000 code repositories. At its core, this attack involved the GitHub Action known as tj-actions/changed-files, which enabled attackers to leak critical secrets like passwords from public repositories. The incident underscores the vulnerability of public

Read More