Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Why Has Russia Labeled Recorded Future as ‘Undesirable’?
Cyber Security
Why Has Russia Labeled Recorded Future as ‘Undesirable’?

In an escalating move that reflects the growing friction between Russia and the West, Moscow has labeled Recorded Future, a well-known cybersecurity firm, as “undesirable.” This designation, reserved for entities considered harmful to Russia’s national interests and security, has been applied to various media, political, and organizational entities since 2015. Russia’s Prosecutor General’s Office has accused Recorded Future of collaborating

Read More
How Are Blockchain, IoT, and AI Revolutionizing Digital Transformation?
IT Digital Transformation
How Are Blockchain, IoT, and AI Revolutionizing Digital Transformation?

The convergence of blockchain, Internet of Things (IoT), and Artificial Intelligence (AI) is creating a transformative trio in digital transformation. This synergy is no longer a futuristic vision but a rapidly emerging reality, enabling the creation of smarter, more connected ecosystems through the seamless interaction of devices, networks, and AI. Blockchain: Building Trust Evolution from Concept to Practical Tool Blockchain

Read More
How Can Toshiba Enhance Cyber-Resilience in Industrial Control Systems?
Cyber Security
How Can Toshiba Enhance Cyber-Resilience in Industrial Control Systems?

The critical issue of cybersecurity within industrial control systems (ICSs) has taken on immense significance in the face of recent global tensions. Catastrophic events, such as the Russian invasion of Ukraine and persistent conflicts in the Middle East, have escalated the scope of cyber-attacks to include not only the directly involved parties but also their allies and supporters. These malevolent

Read More
Are You Falling for the Holiday Season’s Fastest-Growing Scam?
Cyber Security
Are You Falling for the Holiday Season’s Fastest-Growing Scam?

The holiday season is a time of joy and giving, but it also brings an increase in parcel deliveries. Unfortunately, this surge in deliveries has given rise to a new and rapidly growing scam: fake parcel delivery text messages. These scams are becoming increasingly sophisticated, preying on the busy and distracted nature of the season. The Rise of Fake Parcel

Read More
Is Ryanair Violating GDPR with Mandatory Biometric Data Collection?
Cyber Security
Is Ryanair Violating GDPR with Mandatory Biometric Data Collection?

The European Center for Digital Rights (noyb) has lodged a GDPR complaint against Ryanair, alleging that the airline’s requirements for customers to create accounts and submit intrusive biometric data to book flights violate European data protection laws. Unlike many other airlines, Ryanair mandates new customers to set up an account by providing personal information, including a biometric facial recognition process.

Read More
Sophos Releases Hotfixes for Critical Firewall Vulnerabilities
Cyber Security
Sophos Releases Hotfixes for Critical Firewall Vulnerabilities

Sophos has issued important hotfixes to address three critical security flaws discovered in its firewall products. These vulnerabilities have the potential to enable remote code execution and allow unauthorized privileged system access under specific conditions. Significantly, two out of the three identified flaws have been rated as Critical in severity. However, there is currently no evidence that these security gaps

Read More
How Can Visibility, Automation, and Orchestration Drive IT Modernization?
DevOps
How Can Visibility, Automation, and Orchestration Drive IT Modernization?

In today’s fast-paced digital landscape, organizations are under immense pressure to modernize their IT environments. This modernization is crucial for addressing various IT and business challenges such as cost optimization, simplification, faster time to market, managing technical debt, and achieving larger scales. A cohesive and automated DevOps toolchain plays a critical role in this transformation, integrating new technologies and infrastructure

Read More
Krispy Kreme Hit by Play Ransomware, Sensitive Data Threatened
Cyber Security
Krispy Kreme Hit by Play Ransomware, Sensitive Data Threatened

In an alarming development for Krispy Kreme, the popular doughnut company fell victim to a ransomware attack orchestrated by the infamous Play ransomware group, also known as PlayCrypt. First detected on November 29, 2024, the breach led to significant disruptions in their online ordering systems but fortunately left physical store operations unhindered. On December 19, PlayCrypt brazenly announced their responsibility

Read More
Critical Security Flaw in Fortinet FortiWLM Could Lead to Admin Access
Cyber Security
Critical Security Flaw in Fortinet FortiWLM Could Lead to Admin Access

In the ever-evolving landscape of network security, the recent discovery of a significant flaw in Fortinet’s Wireless LAN Manager (FortiWLM) has brought to light the grave risks posed to digital infrastructures worldwide. The vulnerability, identified as CVE-2023-34990, has the potential to leak sensitive information and allow unauthorized admin access, signaling an urgent need for immediate remedial action. This flaw, with

Read More
Security-First Approach: Safeguarding AI Implementation and Data Integrity
Cyber Security
Security-First Approach: Safeguarding AI Implementation and Data Integrity

In today’s rapidly evolving technological landscape, the integration of generative artificial intelligence (GenAI) into business processes is accelerating at an unprecedented pace. However, this rush to adopt AI technologies often overlooks the critical aspect of security, leading to potential data leaks, biases within AI models, and compliance issues. Emphasizing the importance of protecting data integrity while harnessing the benefits of

Read More
Are You Vulnerable to Remote Code Attacks? Update Chrome Now
Cyber Security
Are You Vulnerable to Remote Code Attacks? Update Chrome Now

Google has rolled out a critical update for its Chrome browser that addresses several high-severity vulnerabilities which could allow unauthorized memory access and other security exploits. Users who do not update their browser promptly may be at risk of remote code execution attacks that could compromise their systems. Taking immediate action to update your Chrome browser is essential to safeguard

Read More
Debunking TikTok Myths: Hackers Cannot Steal Credit Card Data via AirDrop
Cyber Security
Debunking TikTok Myths: Hackers Cannot Steal Credit Card Data via AirDrop

In recent times, viral videos circulating on the social media platform TikTok have perpetuated a hoax claiming that hackers can steal your credit card information via the iPhone’s AirDrop feature. However, this is nothing more than misinformation. These false claims suggest that a recent update to the iPhone’s AirDrop feature allows hackers to steal credit card information from Apple Wallet

Read More