Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
SentinelOne Acquires PingSafe to Bolster Cloud-Native Application Protection Capabilities
Cyber Security
SentinelOne Acquires PingSafe to Bolster Cloud-Native Application Protection Capabilities

Cybersecurity giant SentinelOne has announced its plans to acquire PingSafe in a cash-and-stock deal, expanding its product portfolio with the addition of a cloud-native application protection platform (CNAPP) capabilities. This strategic move reflects SentinelOne’s commitment to enhancing its cybersecurity solutions and solidifying its position in the market. Background of the companies SentinelOne is a cybersecurity powerhouse based in Mountain View,

Read More
Xerox Data Breach: A Comprehensive Investigation into the Intrusion
Cyber Security
Xerox Data Breach: A Comprehensive Investigation into the Intrusion

In the world of cybersecurity, no company is immune to the threat of data breaches. Xerox, a renowned multinational corporation, recently fell victim to a breach in its subsidiary, XBS US. The details surrounding the incident are still under investigation, but initial reports indicate that the intrusion was contained within XBS US, mitigating any further escalation. As soon as Xerox

Read More
Amnesty International Confirms Government of India’s Use of Pegasus Spyware to Target Journalists and Opposition
Cyber Security
Amnesty International Confirms Government of India’s Use of Pegasus Spyware to Target Journalists and Opposition

In a concerning revelation, Amnesty International has confirmed what Apple had previously warned about in late October – that the government of India is indeed using the infamous Pegasus spyware to target journalists and the opposition. This revelation comes after Apple cautioned Indian journalists and opposition politicians that their iPhones were continuously targeted in state-sponsored attacks. The Indian government responded

Read More
Hack on AI-Enabled Population Health Management Vendor Impacts Healthcare Clients and Millions of Patients
Cyber Security
Hack on AI-Enabled Population Health Management Vendor Impacts Healthcare Clients and Millions of Patients

A hacking incident at a New Jersey-based vendor of artificial intelligence-enabled population health management services has resulted in a significant breach affecting more than a dozen healthcare clients across the country and nearly 4.5 million of their patients. HealthEC LLP, headquartered in Edison, New Jersey, reported the attack to the U.S. Department of Health and Human Services (HHS) as a

Read More
Operation Triangulation: Unveiling a Sophisticated iOS Cyberespionage Campaign
Cyber Security
Operation Triangulation: Unveiling a Sophisticated iOS Cyberespionage Campaign

In an alarming revelation, security researchers have discovered a previously undocumented hardware feature within Apple’s iPhone System on a Chip (SoC) that allows attackers to exploit multiple vulnerabilities, effectively bypassing hardware-based memory protection. This hardware vulnerability has become a critical component of the Operation Triangulation iOS cyberespionage campaign that has been active since 2019. Let’s delve into the details of

Read More
Revolutionizing In-flight Connectivity: A Deep Dive Into The European Aviation Network in Digital Transformation
IT Digital Transformation
Revolutionizing In-flight Connectivity: A Deep Dive Into The European Aviation Network in Digital Transformation

The European Aviation Network (EAN) has emerged as a game-changing solution, revolutionizing the aviation industry by providing seamless, high-speed connectivity to passengers and crew while in-flight. This hybrid network combines satellite and ground-based technology, offering a cost-effective solution for airlines to offer internet connectivity without relying on expensive satellite-only solutions. Let’s take a closer look at how the EAN works

Read More
Revolutionizing Industrial operations: The Power and Potential of Inmarsat BGAN M2M Communication
IT Digital Transformation
Revolutionizing Industrial operations: The Power and Potential of Inmarsat BGAN M2M Communication

Machine-to-machine (M2M) communication has revolutionized industries across the globe, enabling machines to communicate autonomously without the need for human intervention. Inmarsat BGAN M2M, a cutting-edge satellite-based communication technology, has emerged as a game-changer in this field. In this article, we will explore the significance of Inmarsat BGAN M2M and delve into its various applications across industries. Inmarsat BGAN M2M: An

Read More
Protecting against Threat Actor Activity Targeting the ms-appinstaller Protocol Handler
Cyber Security
Protecting against Threat Actor Activity Targeting the ms-appinstaller Protocol Handler

In recent times, there has been a concerning rise in threat actor activity that exploits the ms-appinstaller protocol handler as an access vector for malware, ultimately leading to the distribution of ransomware. This article sheds light on the vulnerabilities of this protocol handler, the findings from Microsoft Threat Intelligence, the activities of financially motivated threat actors, social engineering techniques employed

Read More
Starlink and Ukraine’s Digital Transformation: Potential Benefits, Challenges and Regulatory Considerations
IT Digital Transformation
Starlink and Ukraine’s Digital Transformation: Potential Benefits, Challenges and Regulatory Considerations

In today’s digital age, access to high-speed internet is crucial for economic growth and development. However, many remote areas in Ukraine continue to suffer from limited connectivity. This is where Starlink, a satellite-based internet service, holds the promise of revolutionizing internet access in the country, providing high-speed, low-latency connectivity even to the most remote regions. Economic Benefits Ukraine, like many

Read More
GitHub Takes Major Step to Fortify Software Supply Chain Security
Cyber Security
GitHub Takes Major Step to Fortify Software Supply Chain Security

In a bold move to strengthen the security of the software supply chain, GitHub, the go-to platform for developers and their code, has launched a decisive initiative. This strategic effort primarily focuses on bolstering the foundational elements of the software ecosystem: the developers themselves. GitHub recognizes their pivotal role in fortifying the entire chain and aims to address the inherent

Read More
The Emerging Threat Landscape: AI-Powered Attack Vectors and the Need for Comprehensive Cybersecurity
Cyber Security
The Emerging Threat Landscape: AI-Powered Attack Vectors and the Need for Comprehensive Cybersecurity

In recent years, the proliferation of artificial intelligence (AI) implementations has given rise to a significant increase in AI-powered attack vectors. This article explores the evolving threat landscape, highlighting the importance of understanding and addressing these new challenges. The emergence of advanced tactics requires a comprehensive approach to cybersecurity involving proactive security measures, risk assessment, and effective governance. Fakes as

Read More
Bharat Telco Revolution: Exploring the Impact of 5G and Advanced Satellite Connectivity on India’s Digital Transformation
IT Digital Transformation
Bharat Telco Revolution: Exploring the Impact of 5G and Advanced Satellite Connectivity on India’s Digital Transformation

The telecom industry in India is at the forefront of a major revolution, poised to transform the way communication and connectivity are experienced in the country. With the imminent introduction of 5G technology and advancements in satellite connectivity, India is on the brink of a digital transformation that will propel it into the future. This article explores the potential and

Read More