Cybercrime

Grady Summers, Executive Vice President and Chief Technology Officer, FireEye

Cyber Security: Rules of engagement have broadened, says Grady Summers, CTO, FireEye

Initial cybercrime game was primarily espionage – governments and militaries spying on one another. Quickly the game changed a few short years later, when hackers started using Windows NT to carry out cybercrime. And later on it moved to militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.
Leveraging the capabilities of a good video management system, when clubbed with video analytics, will also allow efficient access to these external camera feeds at the command and control centre.

Crisis management plan imperative to counter cybercrime threats in India: ASSOCHAM-PwC study

Considering that Indian cyberspace is vulnerable to cyber crime, the country must formulate a crisis management plan to tackle cyber attacks, cyber terrorism and cyber espionage attempts
- Advertisement -SAP Hana