Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Revolutionizing Manufacturing: SAP’s Digital Transformation for a Resilient and Sustainable Supply Chain
IT Digital Transformation
Revolutionizing Manufacturing: SAP’s Digital Transformation for a Resilient and Sustainable Supply Chain

Supply chains are the backbone of any manufacturing industry. The efficiency and resilience of supply chains not only impact a company’s bottom line but also play a crucial role in its ability to respond to market changes, customer demands, and unexpected disruptions. In recent years, the increasing complexity and globalization of supply chains have made them more vulnerable to risks,

Read More
Transforming Enterprises: Harnessing Cloud Computing for Growth, Innovation, and Digital Transformation
IT Digital Transformation
Transforming Enterprises: Harnessing Cloud Computing for Growth, Innovation, and Digital Transformation

In today’s digital landscape, cloud computing has become a vital tool for businesses looking to achieve digital transformation. Cloud computing refers to the delivery of services such as storage, servers, and software over the internet. As companies increasingly rely on digital solutions, adopting cloud computing is seen as an opportunity to foster resilience, innovation, growth, and scalability. Opportunities presented by

Read More
Unpatched PaperCut servers are being exploited in the wild, and experts are warning of a possible ransomware attack
Cyber Security
Unpatched PaperCut servers are being exploited in the wild, and experts are warning of a possible ransomware attack

It has been revealed that unpatched servers running PaperCut are being exploited in the wild, sparking concerns of a potential ransomware attack. PaperCut is a print management software provider, and the company has recently issued a warning stating that it has “evidence to suggest that unpatched servers are being exploited in the wild.” Cybersecurity provider Trend Micro has also issued

Read More
Mastering Docker in 2023: Unlocking the Future of Software Development
DevOps
Mastering Docker in 2023: Unlocking the Future of Software Development

In recent years, Docker has emerged as one of the most popular containerization platforms used in software development. A container is a lightweight, standalone, executable software package that contains everything required to run an application, including code, libraries, dependencies, and configurations. Docker containerizes applications and their dependencies to create a standardized unit for software development. This makes Docker an excellent

Read More
Navigating the Digital Frontier: Mastering the Art of Technology Adoption in the Modern Enterprise
IT Digital Transformation
Navigating the Digital Frontier: Mastering the Art of Technology Adoption in the Modern Enterprise

Emerging technologies are transforming the business landscape in unprecedented ways. Early adoption of these technologies can deliver immense capabilities to your business, but it is not without risk. Inadequate due diligence can lead to huge pitfalls, while throwing caution to the wind and prioritizing being an early adopter can result in disastrous consequences. In this article, we will explore the

Read More
ICICI Bank data leak incident
Cyber Security
ICICI Bank data leak incident

ICICI Bank, one of India’s largest private banks, is currently facing a major data leak scandal. Reports from cybersecurity experts have revealed a misconfigured system that resulted in over 3.6 million files exposing sensitive information to potential threat actors. This incident has affected not only the bank but also its clients, who could now be at risk of cyberattacks, identity

Read More
Mastering GDPR Compliance: The Essential Role of Identity Governance and Administration in Today’s Digital Landscape
IT Digital Transformation
Mastering GDPR Compliance: The Essential Role of Identity Governance and Administration in Today’s Digital Landscape

Managing identities and access rights has become crucial to ensuring GDPR compliance in today’s data-driven world. With the shift to cloud computing and the increasing amount of data being stored and shared, organizations must take a strategic approach to identity and access management to secure their sensitive data and ensure compliance with GDPR and other regulations. The Importance of Managing

Read More
Step-By-Step Guide to Deploying a Kubernetes Voting Application Using Azure Cloud Services
DevOps
Step-By-Step Guide to Deploying a Kubernetes Voting Application Using Azure Cloud Services

As technology continues to advance, the demand for efficient application deployment processes is on the rise. One such process is deploying applications onto a Kubernetes cluster. Deploying an application to Kubernetes often involves several steps, including pushing the application’s Docker image to a container registry, creating a Kubernetes cluster, and finally deploying the application on the cluster. This article will

Read More
Guarding Against Cyber espionage: APT28, Malware, and the Importance of Proactive Network Security
Cyber Security
Guarding Against Cyber espionage: APT28, Malware, and the Importance of Proactive Network Security

Cyberattacks on router firmware have significantly increased in recent years, and ‘Jaguar Tooth’ is an example of malware that targets outdated Cisco routers. Reports suggest that the malware can infect routers with the help of a vulnerability exploit by the Advanced Persistent Threat (APT) group known as APT28. Jaguar Tooth leverages this vulnerability to target routers that run an outdated

Read More
Iranian government-backed threat actor “MuddyWater” targets critical infrastructure in the US
Cyber Security
Iranian government-backed threat actor “MuddyWater” targets critical infrastructure in the US

A recent report by Microsoft sheds light on the activities of an Iranian government-backed threat actor known as “Mint Sandstorm.” The group has been identified as being responsible for a series of attacks aimed at critical infrastructure in the US between late 2021 and mid-2022. In this article, we will provide an overview of the threats posed by Mint Sandstorm,

Read More
Docker and Kubernetes Demystified: Revolutionizing Application Deployment and Management
DevOps
Docker and Kubernetes Demystified: Revolutionizing Application Deployment and Management

In recent years, containerization has gained popularity as a powerful tool for software development and deployment. While there are numerous container management platforms available, two of the most popular are Docker and Kubernetes. Both technologies offer unique benefits and applications in the world of microservices development. In this article, we will explore the differences between Docker and Kubernetes, the benefits

Read More
Revolutionizing the Airline Industry: Akasa Air and WebEngage Collaboration to Elevate Customer Engagement and Experience
IT Digital Transformation
Revolutionizing the Airline Industry: Akasa Air and WebEngage Collaboration to Elevate Customer Engagement and Experience

India’s airline industry has been growing rapidly in recent years, and the newest addition to this industry is Akasa Air. Although new, Akasa Air has already established itself as a customer-centric airline with a unique approach to customer satisfaction. Now, in order to further enhance its customer engagement strategy, Akasa Air has partnered with WebEngage, a leading marketing automation platform.

Read More