Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Edge Computing Revolutionizes Urban Management and Retail
IT Digital Transformation
Edge Computing Revolutionizes Urban Management and Retail

In today’s digital landscape, edge computing is revolutionizing city management. By analyzing data on-site or close to its source, it enables cities like Virginia Beach to quickly process environmental information, aiding in effective disaster responses—especially pertinent for flood management projects. This technology not only elevates urban operations but also streamlines the data flow, crucial for supporting the burgeoning Internet of

Read More
Microsoft Exposes APT28’s GooseEgg Hacking Campaign on Windows
Cyber Security
Microsoft Exposes APT28’s GooseEgg Hacking Campaign on Windows

Russian APT groups, notably APT28 with links to the GRU, are advancing their cyber espionage activities. Microsoft’s report highlights APT28’s new “GooseEgg” operation which targets multiple regions, with a specific focus on Ukraine, as well as Europe and North America. This campaign demonstrates the escalating complexity of cybersecurity threats on a global scale. The “GooseEgg” campaign exemplifies the persistent and

Read More
How Will Coca-Cola’s $1.1 Billion AI Deal with Microsoft Evolve Business?
IT Digital Transformation
How Will Coca-Cola’s $1.1 Billion AI Deal with Microsoft Evolve Business?

The Coca-Cola Company has marked a significant milestone in its digital transformation by committing $1.1 billion to a partnership with tech giant Microsoft. This major investment is set to permeate through various compartments of Coca-Cola’s global enterprise. The integration of Microsoft’s cloud and generative AI services, prominently Azure OpenAI Service and Copilot for Microsoft 365, spins a web of potential

Read More
Taming Tool Sprawl: The Shift to Unified Network Platforms
DevOps
Taming Tool Sprawl: The Shift to Unified Network Platforms

In the dynamic world of enterprise IT, the intricacy of networks is increasingly problematic. The convergence of multi-cloud systems and a changing security landscape creates significant challenges for those managing these complex networks. At the heart of these challenges is the proliferation of network management tools—an issue commonly referred to as tool sprawl. This overabundance not only causes inefficiencies but

Read More
How Is ToddyCat Threatening Asia-Pacific Defense?
Cyber Security
How Is ToddyCat Threatening Asia-Pacific Defense?

ToddyCat, a sophisticated threat actor, employs a high-tech toolkit designed for stealth and efficiency in network breaches. Samurai, their signature passive backdoor tool, facilitates inconspicuous entry into targeted systems, allowing attackers to maintain a hidden presence over extended periods. This is merely the inception of various incursions that ultimately introduce more dangerous elements to the compromised network. Upon securing initial

Read More
How Did Infosys Lead Team Global Express’s Cloud Shift?
DevOps
How Did Infosys Lead Team Global Express’s Cloud Shift?

Infosys, a global leader in technology services and consulting, has achieved a significant milestone in partnership with Australia’s Team Global Express, a major logistics provider. The collaboration resulted in a comprehensive cloud transformation, witnessing the migration of more than 300 applications to a cutting-edge hybrid environment that integrates both a sustainable data center and a public cloud infrastructure. Remarkably, this

Read More
How Will Hitachi Vantara’s Platform One Transform Cloud Data Management?
DevOps
How Will Hitachi Vantara’s Platform One Transform Cloud Data Management?

As organizations navigate the complexities of data management in the era of AI and cloud technologies, Hitachi Vantara introduces its latest innovation, the Hitachi Virtual Storage Platform One. This platform is set to revolutionize the handling of data in hybrid cloud environments, responding to the needs of businesses burdened by the rapid growth of data and the concerns of IT

Read More
Apache Acts Swiftly on Dependency Confusion Security Gap
Cyber Security
Apache Acts Swiftly on Dependency Confusion Security Gap

Emerging cybersecurity challenges continue to expose organizations to new risks. Notably, security experts from Legit Security have unveiled a dependency confusion flaw posing serious threats to software supply chain integrity. This type of vulnerability highlights the inherent risks in using third-party components, especially in software that’s no longer maintained or updated, thus falling out of the security radar. The Apache

Read More
Digitizing Landlines: A Call for Urgent Telecom Modernization
IT Digital Transformation
Digitizing Landlines: A Call for Urgent Telecom Modernization

Communication has drastically evolved, heavily leaning on advanced technology for everyday connectivity. This shift underscores the increasing importance of robust digital systems. Telecommunications serve as the critical backbone of this evolution, yet we’re still tethered to antiquated copper wire infrastructure. This dependence not only constrains further progress but also compromises both the dependability and the efficacy of our communication networks.

Read More
Securing IoT Ecosystems: Integrating DevOps for Enhanced Safety
IT Digital Transformation
Securing IoT Ecosystems: Integrating DevOps for Enhanced Safety

The expansion of the Internet of Things (IoT) is transforming our interaction with technology, leading to more intelligent systems in various industries such as healthcare and manufacturing. This surge in interconnected devices also elevates the potential for cybersecurity threats. Embracing DevOps practices could be pivotal in enhancing the security framework of IoT networks. DevOps, an approach that integrates development with

Read More
Embracing Network Automation: The Future of Enterprise Ops
DevOps
Embracing Network Automation: The Future of Enterprise Ops

Enterprises are at a crucial juncture, faced with the choice to innovate or cling to outdated practices. The shift from manual network operations to automation is not merely beneficial but critical. A significant portion of network tasks remains bogged down by old-fashioned, manual processes. Thought leader Jason Edelman provides a blueprint for this transition, advocating for network automation as a

Read More
Navigating the Web: The Essential Guide to FQDNs
DevOps
Navigating the Web: The Essential Guide to FQDNs

In the intricate maze of the internet, where data flows from point to point, the navigation system relies on precise signposts known as Fully Qualified Domain Names (FQDNs). These vital components of the digital world act as unique addresses, guiding information to the right spots in the vast network space. FQDNs are not just random strings of text; they have

Read More