Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Are Cyber Threats in Eastern Europe Escalating?
Cyber Security
Are Cyber Threats in Eastern Europe Escalating?

Recent developments have painted a concerning picture of the cybersecurity landscape in Eastern Europe, where sophisticated threats are raising alarm bells. Reports have emerged detailing a substantial phishing campaign targeting key regions like Russia and Ukraine, orchestrated by the organized threat group Hive0117. This campaign involves the deployment of DarkWatchman malware, a sophisticated fileless JavaScript-based threat that has been causing

Read More
Abu Dhabi Leads Energy Innovation with AI and Digital Tech
IT Digital Transformation
Abu Dhabi Leads Energy Innovation with AI and Digital Tech

In recent years, artificial intelligence (AI) and digital transformation have emerged as pivotal engines driving progress across various sectors. Abu Dhabi is harnessing these transformative technologies, particularly within the energy domain, through a strategic cooperation agreement involving the Abu Dhabi Department of Energy (DoE), Presight, and AIQ. This partnership aims to revolutionize the Emirate’s energy landscape, facilitating efficient energy management

Read More
How Do Ransomware Cartels Like DragonForce Operate Today?
Cyber Security
How Do Ransomware Cartels Like DragonForce Operate Today?

In the rapidly evolving world of cyber threats, ransomware cartels like DragonForce have emerged as formidable adversaries, with sophisticated methods that mirror legitimate business operations. These groups are notably thriving due to their ability to adapt quickly to technological advancements and changes in cybersecurity protocols. Their recent incursions into major U.K. retailers, including Co-Op, Harrods, and Marks & Spencer, have

Read More
Lumma Stealer Evolves: Enhanced Threat to Cybersecurity
Cyber Security
Lumma Stealer Evolves: Enhanced Threat to Cybersecurity

Lumma Stealer, an infamous information-stealing malware, has significantly evolved its methodologies and techniques, posing a greater threat. Since its appearance in the cybersecurity landscape, Lumma Stealer has been relentless, consistently optimizing its attack mechanisms to evade detection and increase its effectiveness. The malware has developed social-engineering tactics, cleverly manipulating user trust and leveraging familiar verification processes like CAPTCHA to conceal

Read More
Accor’s Digital Shift: AI-Driven Hospitality Innovation
IT Digital Transformation
Accor’s Digital Shift: AI-Driven Hospitality Innovation

In an era where technological integration is rapidly transforming industries, Accor has embarked on a significant digital transformation under the guidance of Alix Boulnois, the Chief Commercial, Digital, and Tech Officer. This transformation is not only redefining the hospitality landscape but also setting new benchmarks in how guest experiences, operational efficiencies, and loyalty frameworks are managed. Accor’s approach involves a

Read More
CAF Advances with SAP S/4HANA Cloud for Sustainable Growth
IT Digital Transformation
CAF Advances with SAP S/4HANA Cloud for Sustainable Growth

CAF, a leader in urban rail and bus systems, is undergoing a significant digital transformation by migrating to SAP S/4HANA Cloud Private Edition. This move marks a defining point for the company as it shifts from an on-premises customized environment to a standardized, cloud-based framework. Strategically positioned in Beasain, Spain, CAF has successfully woven SAP solutions into its core business

Read More
Is Fashion Tech the Future of Sustainable Style?
IT Digital Transformation
Is Fashion Tech the Future of Sustainable Style?

The fashion industry is witnessing an unprecedented transformation, marked by the fusion of cutting-edge technology with traditional design processes. This intersection, often termed “fashion tech,” is reshaping the creative landscape of fashion, altering the way clothing is designed, produced, and consumed. As new technologies like artificial intelligence, augmented reality, and blockchain become integral to the fashion ecosystem, the industry is

Read More
GoDaddy Agency Boosts Growth for Digital Consultants
IT Digital Transformation
GoDaddy Agency Boosts Growth for Digital Consultants

In a rapidly evolving digital landscape, staying competitive and adapting to marketplace shifts have become essential for digital consultants aiming to sustain growth. GoDaddy has responded to this need by launching GoDaddy Agency, a new partner program specifically designed to help digital agencies form strong connections with small and mid-sized businesses. This initiative offers agencies a suite of essential resources,

Read More
Is Quantum Computing Ready to Revolutionize Technology?
IT Digital Transformation
Is Quantum Computing Ready to Revolutionize Technology?

In recent years, the technology sector has been buzzing with discussions about quantum computing and its potential to transform industries. This revolutionary technology, which leverages the principles of quantum mechanics, promises to tackle complex problems that are currently intractable for classical computers. Despite the enthusiasm, quantum computing remains largely in its developmental stage, with several challenges hindering its mass adoption.

Read More
Are SysAid ITSM’s Security Flaws Leaving You Vulnerable?
Cyber Security
Are SysAid ITSM’s Security Flaws Leaving You Vulnerable?

In today’s fast-evolving technological landscape, cybersecurity has become an integral part of business and IT operations. Recently, a noteworthy vulnerability chain was discovered in SysAid’s On-Premise IT Service Management (ITSM) platform. This flaw is particularly alarming as it facilitates pre-authenticated Remote Command Execution (RCE). By combining XML External Entity (XXE) vulnerabilities and an OS command injection flaw, this vulnerability enables

Read More
Are CFOs Ready for the Digital Transformation Challenge?
IT Digital Transformation
Are CFOs Ready for the Digital Transformation Challenge?

The rapidly changing business environment demands a transformational shift where digitalization is no longer a mere option but an essential strategy for sustained competitiveness. Chief Financial Officers (CFOs) have emerged as pivotal figures in this transition, with the task of integrating technology not only to optimize financial operations but also to overhaul broader business processes. A recent survey has underscored

Read More
Ransomware Dominates UK Cyber Claims Despite Resilience Gains
Cyber Security
Ransomware Dominates UK Cyber Claims Despite Resilience Gains

In the dynamic world of cybersecurity, ransomware has solidified its position as the predominant threat impacting the UK, marked by its substantial influence on cyber insurance claims. The year 2024 saw an unprecedented surge in claims, the second-highest on record, due in no small part to the relentless activities of ransomware attackers. Global insurance broker Marsh conducted an analysis revealing

Read More