Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Krispy Kreme Hit by Play Ransomware, Sensitive Data Threatened
Cyber Security
Krispy Kreme Hit by Play Ransomware, Sensitive Data Threatened

In an alarming development for Krispy Kreme, the popular doughnut company fell victim to a ransomware attack orchestrated by the infamous Play ransomware group, also known as PlayCrypt. First detected on November 29, 2024, the breach led to significant disruptions in their online ordering systems but fortunately left physical store operations unhindered. On December 19, PlayCrypt brazenly announced their responsibility

Read More
Critical Security Flaw in Fortinet FortiWLM Could Lead to Admin Access
Cyber Security
Critical Security Flaw in Fortinet FortiWLM Could Lead to Admin Access

In the ever-evolving landscape of network security, the recent discovery of a significant flaw in Fortinet’s Wireless LAN Manager (FortiWLM) has brought to light the grave risks posed to digital infrastructures worldwide. The vulnerability, identified as CVE-2023-34990, has the potential to leak sensitive information and allow unauthorized admin access, signaling an urgent need for immediate remedial action. This flaw, with

Read More
Security-First Approach: Safeguarding AI Implementation and Data Integrity
Cyber Security
Security-First Approach: Safeguarding AI Implementation and Data Integrity

In today’s rapidly evolving technological landscape, the integration of generative artificial intelligence (GenAI) into business processes is accelerating at an unprecedented pace. However, this rush to adopt AI technologies often overlooks the critical aspect of security, leading to potential data leaks, biases within AI models, and compliance issues. Emphasizing the importance of protecting data integrity while harnessing the benefits of

Read More
Are You Vulnerable to Remote Code Attacks? Update Chrome Now
Cyber Security
Are You Vulnerable to Remote Code Attacks? Update Chrome Now

Google has rolled out a critical update for its Chrome browser that addresses several high-severity vulnerabilities which could allow unauthorized memory access and other security exploits. Users who do not update their browser promptly may be at risk of remote code execution attacks that could compromise their systems. Taking immediate action to update your Chrome browser is essential to safeguard

Read More
Debunking TikTok Myths: Hackers Cannot Steal Credit Card Data via AirDrop
Cyber Security
Debunking TikTok Myths: Hackers Cannot Steal Credit Card Data via AirDrop

In recent times, viral videos circulating on the social media platform TikTok have perpetuated a hoax claiming that hackers can steal your credit card information via the iPhone’s AirDrop feature. However, this is nothing more than misinformation. These false claims suggest that a recent update to the iPhone’s AirDrop feature allows hackers to steal credit card information from Apple Wallet

Read More
ActiveState Unveils New Platform to Enhance Open Source Security and Management
Cyber Security
ActiveState Unveils New Platform to Enhance Open Source Security and Management

Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed true over the years: our commitment to the open source community and companies using open source in their code. ActiveState has been helping enterprises manage open source for over a decade. In the early days, open source was in its

Read More
Is Your GD&T Data Ready for Digital Manufacturing Transformation?
IT Digital Transformation
Is Your GD&T Data Ready for Digital Manufacturing Transformation?

In the rapidly evolving landscape of manufacturing, digital transformation is no longer a futuristic concept but a present-day reality. As manufacturers and mechanical engineers increasingly adopt digital tools and techniques, the role of geometric dimensioning and tolerancing (GD&T) becomes more critical than ever. Ensuring the accuracy, consistency, and integration of GD&T data is essential for achieving part quality and optimizing

Read More
How Does Microsoft Sentinel Improve SAP Security Integration?
Cyber Security
How Does Microsoft Sentinel Improve SAP Security Integration?

In a rapidly evolving cybersecurity landscape, Microsoft Sentinel has emerged as a crucial player, introducing a groundbreaking agentless integration capability specifically tailored for SAP workloads. SAP landscapes, with their expansive and critical nature, constantly face vulnerabilities that can be weaponized swiftly, leading to severe consequences. This new capability directly addresses the urgent need for robust security measures by utilizing the

Read More
How Does AI Enhance Cybersecurity in Today’s Digital Landscape?
Cyber Security
How Does AI Enhance Cybersecurity in Today’s Digital Landscape?

In today’s rapidly evolving digital landscape, businesses are increasingly adopting digital solutions and devices, leading to a growing reliance on virtual systems. While these systems offer unparalleled convenience and efficiency, they also become prime targets for cybercriminals. As a result, robust cybersecurity frameworks are essential to protect sensitive information. However, as cyber threats evolve, so too must the strategies designed

Read More
Are European Companies Ready for DORA’s Cybersecurity Standards?
Cyber Security
Are European Companies Ready for DORA’s Cybersecurity Standards?

As the EU’s Digital Operational Resilience Act (DORA) deadline looms on January 17, 2025, European companies are under immense pressure to enhance their cybersecurity frameworks. A recent report by SecurityScorecard has made it clear that major vulnerabilities exist, with 98% of Europe’s top 100 companies experiencing third-party breaches in the past year. This unsettling statistic underscores the widespread vulnerabilities within

Read More
Enhancing Utility Efficiency: Temetra’s Role in Digital Transformation
IT Digital Transformation
Enhancing Utility Efficiency: Temetra’s Role in Digital Transformation

In today’s rapidly evolving landscape, driven by digitalization and an increased demand for operational efficiency, utilities face the challenge of managing diverse systems and streamlining processes. The key focus is on gaining total control over their data to stay ahead of evolving customer demands and regulatory pressures. This shift necessitates a strategic approach towards digital transformation—successfully integrating various technologies and

Read More
India’s Cybersecurity Startups Shaping Digital Transformation by 2025
IT Digital Transformation
India’s Cybersecurity Startups Shaping Digital Transformation by 2025

The digital landscape in India is undergoing a significant transformation as businesses and institutions increasingly adopt new technologies. However, with the rise of digital initiatives comes a surge in cyber threats like ransomware, data breaches, and sophisticated cybercrimes. To counter these threats, several emerging cybersecurity startups in India are pioneering innovative solutions to safeguard digital infrastructure, data, and systems. These

Read More