Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
How Is AI Redefining Customer Experience in Digital Transformation?
IT Digital Transformation
How Is AI Redefining Customer Experience in Digital Transformation?

Digital transformation is a process through which businesses integrate digital technologies to transform their operations, services, and customer interactions. The core of this transformation journey has expanded past mere automation to embrace a more comprehensive and personalized approach, driven by advancements in Artificial Intelligence (AI) and data analytics. This article delves into the significant impact AI is having on redefining

Read More
Hackers Indicted for Massive AT&T Data Breach Affecting Millions
Cyber Security
Hackers Indicted for Massive AT&T Data Breach Affecting Millions

Imagine discovering that your driver’s license, passport number, and Social Security number have all been stolen in a hacking incident alongside your call history and financial records. That’s the reality for countless individuals affected by a massive data breach orchestrated by two hackers, Alexander Connor Moucka and John Binns. The breach affected AT&T and other companies, leading to the theft

Read More
Navigating AI Adoption: Lessons Learned from Digital Transformation
IT Digital Transformation
Navigating AI Adoption: Lessons Learned from Digital Transformation

In the rapidly evolving business landscape, artificial intelligence (AI) is emerging as a transformative force, much like digital transformation did a decade ago. Organizations are now faced with the challenge of integrating AI into their operations to stay competitive and deliver enhanced value to customers. This journey, however, is not just about adopting new technology; it involves significant cultural and

Read More
Integrating Technology and Workforce Upskilling in Manufacturing
IT Digital Transformation
Integrating Technology and Workforce Upskilling in Manufacturing

Digital transformation in the manufacturing industry isn’t solely about integrating new technologies; it involves significant changes in both business processes and workforce management. Achieving success in these initiatives necessitates comprehensive and thoughtful planning that includes clearly defining and communicating the rationale behind the transformation, its anticipated business impacts, the nature of the changes to be implemented, and the concrete steps

Read More
Fiskars Data Breach Exposes SSNs and Names of Over 6,000 Individuals
Cyber Security
Fiskars Data Breach Exposes SSNs and Names of Over 6,000 Individuals

In a startling revelation, renowned Finnish consumer goods maker Fiskars Group disclosed a data breach that occurred between March 31st and April 8th, which led to the exposure of personal data from over 6,000 people. The compromised information included crucial details such as names and Social Security numbers (SSNs), significantly increasing the risk of identity theft and financial fraud for

Read More
Are You Protecting Against the Latest Cybersecurity Threats?
Cyber Security
Are You Protecting Against the Latest Cybersecurity Threats?

In today’s digital age, cybersecurity threats are evolving at an unprecedented pace. From zero-day vulnerabilities in popular software to sophisticated state-sponsored attacks, the landscape is becoming increasingly complex. This article delves into the latest cybersecurity threats, providing insights into how they affect various sectors and what measures can be taken to stay protected. Key Cybersecurity Vulnerabilities Opera Browser 0-Day Flaw

Read More
Orrick Settles for $8M After Data Breach Impacting 638,000 Individuals
Cyber Security
Orrick Settles for $8M After Data Breach Impacting 638,000 Individuals

The prominent law firm Orrick, Herrington & Sutcliffe has reached a significant legal resolution following a data breach that affected over 638,000 individuals. The $8 million settlement, approved by a U.S. district court in the Northern District of California, highlights the cybersecurity challenges faced by law firms, especially those servicing the healthcare industry. This settlement not only addresses the financial

Read More
How Does HookBot Threaten Android Users with Overlay Attacks?
Cyber Security
How Does HookBot Threaten Android Users with Overlay Attacks?

Malware threats continue to evolve, and among the latest to menace Android users is HookBot, a banking Trojan that leverages overlay attacks to impersonate popular brands. Overlay attacks involve placing a deceptive layer over legitimate app interfaces, tricking users into entering sensitive information such as banking credentials, passwords, and personal data. Discovered by security analysts at NetCraft, HookBot is distributed

Read More
How Will AIOps Transform IT Operations and Enhance Efficiency?
DevOps
How Will AIOps Transform IT Operations and Enhance Efficiency?

Artificial Intelligence for IT Operations, or AIOps, is significantly transforming the way IT departments function by integrating AI and machine learning into IT workflows. The primary goal of AIOps is to automate and enhance the efficiency of IT operations, thereby addressing the escalating complexities of modern IT environments. By leveraging technologies such as natural language processing (NLP) and machine learning

Read More
Can Filigran’s $35M Funding Propel Them to Cybersecurity Dominance?
Cyber Security
Can Filigran’s $35M Funding Propel Them to Cybersecurity Dominance?

Filigran, an innovative player in the European cybersecurity landscape, has successfully secured a substantial $35 million in a Series B funding round led by Insight Partners, with continued backing from previous investors Accel and Moonfire. This influx follows swiftly on the heels of Filigran’s $16 million Series A round, signaling robust confidence in the company’s advanced cybersecurity solutions. Since its

Read More
South Korea Faces Surge in Cyber-Attacks Amid North Korean Troop Deployment
Cyber Security
South Korea Faces Surge in Cyber-Attacks Amid North Korean Troop Deployment

In recent months, the frequency and intensity of cyber-attacks targeting South Korea have escalated significantly, coinciding with the deployment of North Korean soldiers in Ukraine. These cyber-attacks, primarily executed as distributed denial-of-service (DDoS) attacks, have targeted government websites and several private companies, temporarily disrupting their operations. However, these attacks have not resulted in lasting damage beyond the inconvenience of temporary

Read More
FakeCall Malware Threatens Android Users With Advanced Vishing Tactics
Cyber Security
FakeCall Malware Threatens Android Users With Advanced Vishing Tactics

In the ever-evolving landscape of cyber threats, a new variant of the FakeCall malware has surfaced, leveraging advanced vishing (voice phishing) techniques to take unprecedented control over mobile devices. Targeting primarily Android users, this sophisticated malware raises significant security concerns. Highlighted by Zimperium’s research team, FakeCall exemplifies the growing need for vigilant mobile security practices as it continues to evolve

Read More