Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Ransomware Attack on Blue Yonder Disrupts Major Supply Chains
Cyber Security
Ransomware Attack on Blue Yonder Disrupts Major Supply Chains

In a significant blow to several major organizations, a ransomware attack has targeted Blue Yonder, a key supply chain management software provider, causing considerable disruptions across various sectors. Operating out of Scottsdale, Arizona, Blue Yonder provides a range of critical services, including inventory management and distribution systems, as well as generative AI tools tailored for supply chains. The incident was

Read More
RomCom Exploits Zero-Day Flaws in Firefox and Windows to Deploy Malware
Cyber Security
RomCom Exploits Zero-Day Flaws in Firefox and Windows to Deploy Malware

The sophistication of cyberattacks has reached new heights with RomCom, a notorious threat actor, exploiting zero-day vulnerabilities in both Firefox and Windows to deploy their RomCom RAT malware. These vulnerabilities, identified as CVE-2024-9680 and CVE-2024-49039, have facilitated a series of high-severity attacks that leveraged minimal user interaction to achieve significant security breaches. CVE-2024-9680, a high-severity use-after-free flaw in Firefox, was

Read More
Did Poor Security Practices Cost GEICO and Travelers Millions?
Cyber Security
Did Poor Security Practices Cost GEICO and Travelers Millions?

The State of New York has seen a significant development in its efforts to protect consumer data with an $11.3 million settlement reached between the state and two prominent car insurance companies, GEICO and The Travelers Indemnity Company. This settlement arose due to serious data breaches that compromised the sensitive personal information of over 120,000 residents. Both companies were found

Read More
Enhancing Cybersecurity Through Effective Privileged Access Management
Cyber Security
Enhancing Cybersecurity Through Effective Privileged Access Management

Cybercriminals frequently target an organization’s privileged accounts since they provide a direct route to highly prized assets. If compromised, these privileged accounts and sessions can be exploited for malicious activities, potentially leading to significant cybersecurity incidents. Such incidents can cause operational disruptions, financial losses, compliance issues, and reputational damage. Implementing robust privileged account and session management (PASM) practices can help

Read More
MedOne’s Role in Israel’s Cloud Evolution and Digital Transformation
IT Digital Transformation
MedOne’s Role in Israel’s Cloud Evolution and Digital Transformation

Israel has earned global recognition for its tech prowess and vibrant startup ecosystem. Central to maintaining and expanding this status is the adoption and development of advanced cloud computing solutions. MedOne, a leading Israeli cloud services provider, stands at the forefront of this transformative journey. This company drives the digital evolution of various industries by offering state-of-the-art infrastructure and leveraging

Read More
Are You Falling for Black Friday Email Scams?
Cyber Security
Are You Falling for Black Friday Email Scams?

Black Friday, an event eagerly anticipated by shoppers for its significant discounts and deals, has become a prime opportunity for cybercriminals to hit consumers with a wave of spam emails. An alarming three-quarters of these emails are identified as scams, positioning shoppers at substantial risk as they hunt for the best prices. With the increased shopping activity during this period,

Read More
DOJ Pushes Google to Sell Chrome to Address Search Monopoly
Cyber Security
DOJ Pushes Google to Sell Chrome to Address Search Monopoly

In a groundbreaking move that could reshape the internet landscape, the US Justice Department (DOJ) and a coalition of states are seeking to force Google to divest its Chrome browser to rectify the company’s online search monopoly. This initiative is rooted in Judge Amit Mehta’s August ruling, which found that Google had unlawfully maintained its search dominance. The DOJ and

Read More
How Are Ransomware Groups Evolving and Exploiting New Vulnerabilities?
Cyber Security
How Are Ransomware Groups Evolving and Exploiting New Vulnerabilities?

Ransomware attacks have continued to evolve in complexity and scope, presenting significant challenges for businesses and individuals alike in the third quarter of 2024. Recent research from Corvus Insurance has revealed that a small group of ransomware collectives, including the notorious RansomHub and LockBit 3.0, were behind nearly 40% of all cyber-attacks during this period. The overall number of active

Read More
Apple Deploys Critical Updates to Fix Security Vulnerabilities in Devices
Cyber Security
Apple Deploys Critical Updates to Fix Security Vulnerabilities in Devices

In a rapid move to safeguard its users from potential cyber threats, Apple recently issued an emergency security update that addresses two actively exploited vulnerabilities on its devices. The update includes new versions of iOS 18.1.1, iPadOS 18.1.1, Safari 18.1.1, visionOS 2.1.1, and macOS Sequoia 15.1.1, covering a comprehensive selection of Apple devices, such as iPhones, iPads, and Macs. Furthermore,

Read More
Microsoft Boosts Windows Security With New Features Rolling Out in 2025
Cyber Security
Microsoft Boosts Windows Security With New Features Rolling Out in 2025

In a significant push to strengthen the resilience and security of its operating systems, Microsoft is set to roll out a series of advanced security features for Windows by 2025. These updates aim to address critical user and application privileges, enhance recovery mechanisms from system crashes, and fortify overall system defenses. The upcoming enhancements cover a broad spectrum of improvements,

Read More
How Is Digital Transformation Redefining Human Services in ECA?
IT Digital Transformation
How Is Digital Transformation Redefining Human Services in ECA?

Digital transformation is rapidly reshaping the landscape of health, education, and social protection services in Europe and Central Asia (ECA), bringing both significant opportunities and formidable challenges. As highlighted by researchers Ahmet Levent Yener and Jamexis Denise Christian in a recent World Bank report, the influence of digital technologies in these sectors is profound, yet there are critical considerations regarding

Read More
How Will Digital Transformation Shape Finances by 2025?
IT Digital Transformation
How Will Digital Transformation Shape Finances by 2025?

Digital transformation is revolutionizing the finance sector, setting the stage for significant changes by 2025. This article explores the key areas where digital transformation is making the most impact: customer experience, operational efficiency, and risk management. The transformation envisages a future where customers enjoy seamless, personalized interactions; operational processes are more efficient and accurate, and comprehensive risk management strategies are

Read More