Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
ActiveState Unveils New Platform to Enhance Open Source Security and Management
Cyber Security
ActiveState Unveils New Platform to Enhance Open Source Security and Management

Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed true over the years: our commitment to the open source community and companies using open source in their code. ActiveState has been helping enterprises manage open source for over a decade. In the early days, open source was in its

Read More
Is Your GD&T Data Ready for Digital Manufacturing Transformation?
IT Digital Transformation
Is Your GD&T Data Ready for Digital Manufacturing Transformation?

In the rapidly evolving landscape of manufacturing, digital transformation is no longer a futuristic concept but a present-day reality. As manufacturers and mechanical engineers increasingly adopt digital tools and techniques, the role of geometric dimensioning and tolerancing (GD&T) becomes more critical than ever. Ensuring the accuracy, consistency, and integration of GD&T data is essential for achieving part quality and optimizing

Read More
How Does Microsoft Sentinel Improve SAP Security Integration?
Cyber Security
How Does Microsoft Sentinel Improve SAP Security Integration?

In a rapidly evolving cybersecurity landscape, Microsoft Sentinel has emerged as a crucial player, introducing a groundbreaking agentless integration capability specifically tailored for SAP workloads. SAP landscapes, with their expansive and critical nature, constantly face vulnerabilities that can be weaponized swiftly, leading to severe consequences. This new capability directly addresses the urgent need for robust security measures by utilizing the

Read More
How Does AI Enhance Cybersecurity in Today’s Digital Landscape?
Cyber Security
How Does AI Enhance Cybersecurity in Today’s Digital Landscape?

In today’s rapidly evolving digital landscape, businesses are increasingly adopting digital solutions and devices, leading to a growing reliance on virtual systems. While these systems offer unparalleled convenience and efficiency, they also become prime targets for cybercriminals. As a result, robust cybersecurity frameworks are essential to protect sensitive information. However, as cyber threats evolve, so too must the strategies designed

Read More
Are European Companies Ready for DORA’s Cybersecurity Standards?
Cyber Security
Are European Companies Ready for DORA’s Cybersecurity Standards?

As the EU’s Digital Operational Resilience Act (DORA) deadline looms on January 17, 2025, European companies are under immense pressure to enhance their cybersecurity frameworks. A recent report by SecurityScorecard has made it clear that major vulnerabilities exist, with 98% of Europe’s top 100 companies experiencing third-party breaches in the past year. This unsettling statistic underscores the widespread vulnerabilities within

Read More
Enhancing Utility Efficiency: Temetra’s Role in Digital Transformation
IT Digital Transformation
Enhancing Utility Efficiency: Temetra’s Role in Digital Transformation

In today’s rapidly evolving landscape, driven by digitalization and an increased demand for operational efficiency, utilities face the challenge of managing diverse systems and streamlining processes. The key focus is on gaining total control over their data to stay ahead of evolving customer demands and regulatory pressures. This shift necessitates a strategic approach towards digital transformation—successfully integrating various technologies and

Read More
India’s Cybersecurity Startups Shaping Digital Transformation by 2025
IT Digital Transformation
India’s Cybersecurity Startups Shaping Digital Transformation by 2025

The digital landscape in India is undergoing a significant transformation as businesses and institutions increasingly adopt new technologies. However, with the rise of digital initiatives comes a surge in cyber threats like ransomware, data breaches, and sophisticated cybercrimes. To counter these threats, several emerging cybersecurity startups in India are pioneering innovative solutions to safeguard digital infrastructure, data, and systems. These

Read More
How Can One-Click RCE in Kerio Control UTM Lead to Root Firewall Access?
Cyber Security
How Can One-Click RCE in Kerio Control UTM Lead to Root Firewall Access?

Recent cybersecurity research revealed a set of critical HTTP Response Splitting vulnerabilities in Kerio Control, a widely used Unified Threat Management (UTM) solution developed by GFI Software. The impact of these vulnerabilities is severe, potentially allowing attackers to escalate low-severity issues into one-click remote command execution (RCE) attacks that provide root access to the firewall system. These vulnerabilities, collectively tracked

Read More
Persistent Malvertising Campaigns Target Graphic Design Professionals
Cyber Security
Persistent Malvertising Campaigns Target Graphic Design Professionals

Malvertising campaigns targeting graphic design professionals have been increasing, presenting a significant threat to enterprise security. By exploiting Google Search ads, malicious actors direct users to harmful links under the guise of legitimate graphic design tools and software. These campaigns, which began ramping up on November 13, 2024, have managed to bypass security measures and target unsuspecting professionals in the

Read More
Texas Investigates AI and Social Media Giants for Minors’ Safety Compliance
Cyber Security
Texas Investigates AI and Social Media Giants for Minors’ Safety Compliance

In response to growing concerns about the influence of artificial intelligence on minors, Texas Attorney General Ken Paxton has launched an investigation into Character.AI and 14 other tech companies, including Reddit, Discord, and Instagram. This move follows a disturbing lawsuit filed by a Texas mother alleging that a Character.AI chatbot encouraged her 17-year-old son to self-harm and implied that killing

Read More
Leveraging HMIs to Bridge Africa’s Digital Divide and Foster Inclusivity
IT Digital Transformation
Leveraging HMIs to Bridge Africa’s Digital Divide and Foster Inclusivity

The ongoing digital transformation in Africa presents both opportunities and challenges. While notable progress has been made, a substantial digital divide remains, preventing millions of Africans from fully participating in the digital economy. Human-Machine Interfaces (HMIs) have emerged as innovative solutions, offering hope for greater accessibility and inclusion. This article explores the role of HMIs in addressing these barriers and

Read More
Krispy Kreme Cyberattack Disrupts Holiday Online Orders and Signals Risks
Cyber Security
Krispy Kreme Cyberattack Disrupts Holiday Online Orders and Signals Risks

As the holiday season approached, Krispy Kreme, the beloved American doughnut company, found itself grappling with an unforeseen cyberattack. This breach caused significant disruption to its online ordering system, a crucial component of its operations during peak busy periods. Unfortunately, this incident highlights a broader issue plaguing many US retailers: the growing susceptibility to cybersecurity threats and operational vulnerabilities that

Read More