Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Is Hacktivism Masking Cybercrime and State Espionage?
Cyber Security
Is Hacktivism Masking Cybercrime and State Espionage?

The blurring lines between cybercrime and national security concerns have never been more apparent. In the wake of Recorded Future’s startling revelations about the evolution of hacktivism, an insightful discourse has emerged. This comes against the backdrop of the RSA Conference 2024, where analysts provided a deep dive into how traditional hacktivist activities are now being used as a façade

Read More
Securing Data Governance amid Digital Transformation
IT Digital Transformation
Securing Data Governance amid Digital Transformation

With the rise of digital transformation, securing data governance has become paramount for organizations to maintain integrity and competitiveness. Effective data governance ensures that data is managed properly, risks are minimized, and value is maximized. To achieve this, a structured approach is essential. Here are steps that organizations must consider to solidify their data governance during digital transformation. Identify the

Read More
Building Resilient Manufacturing with Digital Transformation
IT Digital Transformation
Building Resilient Manufacturing with Digital Transformation

As the manufacturing sector grapples with unpredictable market dynamics and evolving customer demands, the concept of resilience becomes not just beneficial, but essential. Resilience in this context is the ability to withstand shocks, recover from difficulties, and continue to evolve and grow despite challenges. The driving force behind resilient manufacturing is digital transformation, a beacon of hope for maintaining competitiveness

Read More
Mastering ITOM: Five Best Practices for Digital Success
DevOps
Mastering ITOM: Five Best Practices for Digital Success

In today’s rapidly transforming digital environment, IT Operations Management (ITOM) has transitioned from a supporting function to a core elemental force driving business forward. As companies across various sectors embrace digital transformation, those who excel in refining their IT operations secure a significant competitive lead. ITOM not only underpins system reliability and superior user experiences but also propels innovation and

Read More
Dropbox Sign Security Breach Exposes User Data and Credentials
Cyber Security
Dropbox Sign Security Breach Exposes User Data and Credentials

Dropbox has confronted a severe security breach concerning its Dropbox Sign service, previously known as HelloSign. The unsettling incident was disclosed in a recent filing with the Securities and Exchange Commission (SEC). According to the company, the episode of unauthorized access occurred on April 24, 2024, leading to the exposure of sensitive customer information. The compromised data encompassed a range

Read More
How Are the 2024 IoT Trends Shaping UK Businesses?
IT Digital Transformation
How Are the 2024 IoT Trends Shaping UK Businesses?

The Internet of Things (IoT) is transforming how UK businesses operate, grow, and protect themselves. As we move towards 2024, several IoT trends are creating a new ecosystem of technological innovation intertwined with regulatory compliance. These trends, ranging from legislative compliance and advanced connectivity to the fusion of AI with IoT and innovative memory technologies, are not only redefining the

Read More
How Will Globant’s Partnership Boost F1’s Digital Realm?
IT Digital Transformation
How Will Globant’s Partnership Boost F1’s Digital Realm?

Formula 1 has always raced at the forefront of technology, not just on the track but also in its engagement with fans worldwide. The partnership with Globant, a giant in software development, is set to further this trajectory, promising to revamp Formula 1’s digital landscape. This collaboration is expected to refine crucial IT systems and deliver a digital experience that

Read More
Safeguarding Software with Microsoft’s Trusted Signing Service
DevOps
Safeguarding Software with Microsoft’s Trusted Signing Service

Software security is a paramount concern in the digital age, with code signing playing a crucial role in maintaining the integrity of distributed applications. Microsoft’s Trusted Signing service is at the forefront of streamlining and strengthening the code signing process for developers and organizations. Let’s delve into the step-by-step approach to utilizing this robust service, ensuring that your software remains

Read More
How Does Blippbuilder Mobile Democratize AR Creation?
IT Digital Transformation
How Does Blippbuilder Mobile Democratize AR Creation?

Blippar leads innovation in the augmented reality space with the recent unveiling of its newest product, Blippbuilder Mobile. This pioneering platform is opening up the world of AR creation to a broader audience, empowering users to design, implement, and share AR experiences right from their mobile devices. Blippbuilder Mobile eliminates the need for complex coding knowledge or sophisticated software, setting

Read More
How is Tricentis Copilot Revolutionizing App Testing with AI?
DevOps
How is Tricentis Copilot Revolutionizing App Testing with AI?

In an era where application development is becoming increasingly complex, Tricentis has unveiled a groundbreaking solution that promises to simplify the testing aspect of software engineering. Tricentis Copilot, leveraging the power of generative artificial intelligence, offers a big leap forward in automating the process of creating robust testing procedures. Revolutionizing Testing with Generative AI Streamlining Test Creation with Natural Language

Read More
Top Essential Endpoint Security Best Practices for IT Teams
Cyber Security
Top Essential Endpoint Security Best Practices for IT Teams

In an era where digital threats are escalating, protecting a business’s endpoint infrastructure is more critical than ever. IT teams are the sentinels at the gates of an organization’s network, and their endurance in enhancing endpoint security is of paramount importance. Implementing best practices for endpoint security can make the difference between a secured enterprise and one that’s open to

Read More
How Is the Grand Est Region Bolstering SME Digitalization?
IT Digital Transformation
How Is the Grand Est Region Bolstering SME Digitalization?

In an era where digital prowess spells the difference between success and obsolescence, France’s Grand Est region stands out for its commitment to steer its SMEs toward the digital future. Recognizing the pivotal role these enterprises play in the local economy, regional authorities have taken a proactive stance, keenly partnering with entities like the Chamber of Commerce and Industry of

Read More