Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Are Australian Businesses Ready for the Ransomware Threats?
Cyber Security
Are Australian Businesses Ready for the Ransomware Threats?

Ransomware attacks have become a significant threat to businesses worldwide, with Australian companies particularly hard-hit. A recent study by the Ponemon Institute, commissioned by Illumio, reveals the extensive damage caused by these attacks, affecting business operations, financial health, and reputation. The findings highlight the urgent need for more robust cybersecurity measures to mitigate these threats. The Extent of Operational Disruption

Read More
Are UK Businesses Prepared for the Increasing Cyberattack Threats?
Cyber Security
Are UK Businesses Prepared for the Increasing Cyberattack Threats?

The escalating frequency and sophistication of cyberattacks pose a significant threat to UK businesses, with over 50% experiencing such incidents last year. Despite the alarming rate of attacks, a worrying statistic reveals that only 31% of companies have conducted thorough cyber risk assessments. This lack of preparedness extends further, with just 15% of businesses implementing formal cybersecurity incident management plans.

Read More
Is GhostGPT the Next Big Threat in Cybersecurity?
Cyber Security
Is GhostGPT the Next Big Threat in Cybersecurity?

The advent of AI technologies has revolutionized numerous sectors, offering unprecedented capabilities in automating tasks, enhancing efficiency, and even ensuring security. However, these technologies can also be harnessed for nefarious purposes, as evidenced by the emergence of GhostGPT. This newly launched AI chatbot has swiftly become a favorite tool among cybercriminals, who utilize it to develop malware, execute sophisticated business

Read More
Are Mobile Phishing Attacks With PDF Files Becoming Harder to Detect?
Cyber Security
Are Mobile Phishing Attacks With PDF Files Becoming Harder to Detect?

A new wave of mobile phishing attacks has emerged, exploiting users’ trust in PDF files and masquerading as communications from the US Postal Service (USPS). Cybercriminals have ingeniously tailored this campaign, using SMS phishing messages to alert recipients to undelivered packages due to alleged address issues. These messages prompt users to click on a PDF link, ostensibly to correct the

Read More
How Will AI and Automation Shape the Future of ITOps and DevOps by 2025?
DevOps
How Will AI and Automation Shape the Future of ITOps and DevOps by 2025?

The rapid evolution of artificial intelligence (AI) and automation is set to revolutionize IT operations (ITOps) and Development Operations (DevOps) by 2025. As organizations strive for greater efficiency, security, and innovation, these technologies will play a pivotal role in transforming traditional practices and driving future advancements. The Transformation of IT’s Role From Cost Centers to Profit Optimizers IT departments are

Read More
Are Weak Passwords Putting Your Digital Security at Risk?
Cyber Security
Are Weak Passwords Putting Your Digital Security at Risk?

With 2024 marking an alarming increase in stolen credentials due to a barrage of malware attacks, cybersecurity experts are urging individuals and organizations to take stronger measures to protect their digital identities. The flood of compromised passwords has highlighted the serious vulnerabilities in existing password practices, making it evident that users are still failing to adopt basic security measures. This

Read More
How Can Organizations Protect Against FunkLocker Ransomware?
Cyber Security
How Can Organizations Protect Against FunkLocker Ransomware?

The rise of FunkLocker ransomware, associated with the FunkSec hacktivist group, has introduced a new level of threat to organizations worldwide. Emerging as a ransomware-as-a-service (RaaS) operation, FunkLocker has targeted various entities, particularly government organizations, with sophisticated encryption techniques and a brazen recruitment strategy. This article delves into effective measures organizations can adopt to protect against FunkLocker ransomware. Understanding FunkLocker

Read More
Are LTE and 5G Networks at Risk with Over 100 Security Flaws Found?
Cyber Security
Are LTE and 5G Networks at Risk with Over 100 Security Flaws Found?

The discovery of over 100 security vulnerabilities in LTE and 5G network implementations by academics from the University of Florida and North Carolina State University has raised concerns about the resilience of these advanced cellular networks. These flaws, identified in a research exercise named RANsacked, could allow bad actors to exploit weaknesses, potentially disrupting cellular services and compromising core network

Read More
How Is Travelers’ IT Modernization Driving Growth and Efficiency Gains?
DevOps
How Is Travelers’ IT Modernization Driving Growth and Efficiency Gains?

In the rapidly evolving world of insurance, staying ahead of technological advancements is paramount. Since 2017, The Travelers Companies have been making leaps in IT modernization, significantly ramping up their investments in strategic technological improvements. Over the past few years, the company has dedicated substantial resources to enhancing its IT capabilities while diligently managing standard tech expenditures. In 2024 alone,

Read More
Rising Cyber Threats in 2025: Protecting Critical Infrastructure
Cyber Security
Rising Cyber Threats in 2025: Protecting Critical Infrastructure

As we advance toward the year 2025, the landscape of cybersecurity is undergoing significant transformations. The intertwining nexus of geopolitics and cybersecurity is creating new challenges, with escalating threats to critical infrastructure, healthcare, and financial organizations from state-sponsored cyber adversaries. This article delves into the primary themes, key points, and overarching trends in cybersecurity, ensuring a clear, concise, and coherent

Read More
Are North Korean IT Workers Infiltrating Western Companies for Cyber Espionage?
Cyber Security
Are North Korean IT Workers Infiltrating Western Companies for Cyber Espionage?

North Korean IT workers, often referred to as “IT warriors,” are increasingly targeting Western companies by securing remote positions under fraudulent identities to engage in cyber espionage and extortion. The Federal Bureau of Investigation (FBI) has raised concerns regarding this emerging threat, highlighting North Korea’s evolving cyber tactics aimed at generating revenue while circumventing international sanctions. These operatives use sophisticated

Read More
How Is Digital Transformation Revolutionizing the Insurance Industry?
IT Digital Transformation
How Is Digital Transformation Revolutionizing the Insurance Industry?

Digital transformation is reshaping the insurance industry, bringing about profound changes in how companies operate, interact with customers, and develop products. This transformation is not just about adopting new technologies but involves a comprehensive overhaul of business models, processes, and customer experiences. As insurers navigate this evolving landscape, they must embrace technological advancements to meet market demands and deliver enhanced

Read More