Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Financially Motivated Turkish Threat Actors Target Microsoft SQL Server Databases with RE#TURGENCE Campaign
Cyber Security
Financially Motivated Turkish Threat Actors Target Microsoft SQL Server Databases with RE#TURGENCE Campaign

Financially motivated threat actors have been discovered engaging in a targeted attack campaign, dubbed RE#TURGENCE, aimed at compromising Microsoft SQL Server databases. This sophisticated campaign has primarily focused on organizations in the United States, Europe, and Latin America, with the end goal being the deployment of ransomware or the sale of compromised access to other threat actors. Initial Access To

Read More
Unveiling the Intricate Web: Exploring Hackers’ Evolving Evasion Techniques
Cyber Security
Unveiling the Intricate Web: Exploring Hackers’ Evolving Evasion Techniques

In today’s ever-evolving digital landscape, cybersecurity threats continue to grow more sophisticated, challenging the effectiveness of traditional security solutions. As defenders bolster their defenses, attackers employ ingenious evasion techniques to bypass security products, highlighting the need for a comprehensive understanding of these tactics and effective countermeasures. This article delves into the world of evasion techniques, shedding light on a novel

Read More
SentinelOne and PingSafe Merger: Enhancing Cloud Security with a Unified Solution
Cyber Security
SentinelOne and PingSafe Merger: Enhancing Cloud Security with a Unified Solution

In the ever-evolving digital landscape, cloud security has become a paramount concern for enterprises. As organizations increasingly rely on cloud infrastructure, the need for robust and comprehensive security measures has become critical. Recognizing the significance of this challenge, industry-leading companies SentinelOne and PingSafe have joined forces through a merger, heralding a new era in cloud security. This partnership aims to

Read More
QNAP Systems Releases Patches for High-Severity Vulnerabilities Across Its Product Portfolio
Cyber Security
QNAP Systems Releases Patches for High-Severity Vulnerabilities Across Its Product Portfolio

QNAP Systems, a Taiwan-based company renowned for its network-attached storage (NAS) and professional network video recorder (NVR) products, has recently announced the release of patches for a dozen vulnerabilities found across its product portfolio. These vulnerabilities include high-severity flaws present in the company’s operating system, which pose potential risks to users’ systems and data security. Addressing these vulnerabilities promptly is

Read More
Cybercriminals Use Swatting to Extort Money from Cancer Patients at Fred Hutchinson Cancer Center
Cyber Security
Cybercriminals Use Swatting to Extort Money from Cancer Patients at Fred Hutchinson Cancer Center

Cybercriminals are resorting to swatting as a means to extort money from vulnerable cancer patients at the Seattle-based Fred Hutchinson Cancer Center. This criminal behavior comes in the wake of a cyberattack in November that impacted approximately 1 million individuals. As the threat of swatting looms, patients are being targeted for payments of $50 to protect their information from being

Read More
Revolutionizing Global Operations: Inmarsat’s GX for Government and Military Communications
IT Digital Transformation
Revolutionizing Global Operations: Inmarsat’s GX for Government and Military Communications

Inmarsat GX for Government is a robust, end-to-end managed service that offers secure and high-speed satellite connectivity to government and military users worldwide. With its reliability and resilience, this cutting-edge service equips these users with the ability to access and share data in real-time, leading to faster and more informed decision-making. Inmarsat GX for Government also enables remote operations, ensuring

Read More
Securing the Digital Seas: An In-depth Look at Cybersecurity Measures in the Maritime Industry with Inmarsat Fleet Secure
IT Digital Transformation
Securing the Digital Seas: An In-depth Look at Cybersecurity Measures in the Maritime Industry with Inmarsat Fleet Secure

The maritime industry has witnessed a rapid adoption of Inmarsat Fleet Secure, a cutting-edge solution that offers comprehensive protection against cyber threats. Leading shipping companies and vessel operators have recognized the importance of safeguarding their digital assets and have turned to Inmarsat Fleet Secure for reliable cybersecurity measures. Overview of Inmarsat Fleet Secure Inmarsat Fleet Secure is a cloud-based solution

Read More
CISA Adds Six Security Flaws to CVE Catalog, Urges Federal Agencies to Prioritize Patching
Cyber Security
CISA Adds Six Security Flaws to CVE Catalog, Urges Federal Agencies to Prioritize Patching

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a crucial step in bolstering cybersecurity measures by adding six recently discovered security flaws to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, which are actively being exploited, pose significant risks to various software and devices. CISA has recommended that federal agencies prioritize patching these vulnerabilities by January 29, 2024,

Read More
Zayo Group’s Near-net Expansion: The Future of Fiber Connectivity and Digital Transformation in Europe
IT Digital Transformation
Zayo Group’s Near-net Expansion: The Future of Fiber Connectivity and Digital Transformation in Europe

In an era where connectivity is vital for businesses, Zayo Group’s ambitious ‘near-net’ expansion in Western Europe is set to transform the landscape. Boasting a comprehensive network infrastructure, the project aims to bring 100G connectivity to businesses across the United Kingdom, Republic of Ireland, the Netherlands, Germany, and France. The expansion will provide robust and high-speed network solutions, catering to

Read More
Digital Transformation: The Strategic Imperative, Challenges and Impact on Future Business Survival
IT Digital Transformation
Digital Transformation: The Strategic Imperative, Challenges and Impact on Future Business Survival

Digital transformation has become a crucial endeavor for organizations looking to stay competitive in today’s rapidly evolving business landscape. This article examines the challenges organizations face in achieving successful digital transformations and proposes solutions to address systemic issues that hinder progress. Definition and Importance Digital transformation involves integrating computer-based systems into an organization’s products, processes, and strategies. Its desired outcome

Read More
Revolutionizing Business Operations: How Robotic Process Automation as a Service Accelerates Digital Transformation
IT Digital Transformation
Revolutionizing Business Operations: How Robotic Process Automation as a Service Accelerates Digital Transformation

In today’s fast-paced business landscape, agility and efficiency are paramount for success. To stay competitive, businesses are turning to innovative solutions that can streamline operations and drive digital transformation. One such solution that has emerged as a game-changer is Robotic Process Automation as a Service (RPAaaS). In this article, we will explore the numerous benefits RPAaaS offers and its role

Read More
The Intersection of Convenience and Privacy: Exploring the Data Tracking and Privacy Concerns of Smart Cars
Cyber Security
The Intersection of Convenience and Privacy: Exploring the Data Tracking and Privacy Concerns of Smart Cars

Smart cars have revolutionized the automotive industry, offering a plethora of advanced features that enhance convenience and safety on the roads. From telematics systems to GPS technology, these vehicles are equipped with cutting-edge capabilities. However, as smart cars become more prevalent, concerns about data tracking and privacy have started to emerge. This article delves into the intricacies of data collection,

Read More