Skip to playerSkip to main contentSkip to footer
  • yesterday

Category

🗞
News
Transcript
00:00Cyber Vidakthan, Nandakishor Harigumar, we are doing a telephone line.
00:03Shri, Nandakishor Harigumar,
00:05this software encrypted network,
00:08all the communication tools are available to you.
00:13How do we deal with this?
00:18A general concept,
00:22this is a very important concept.
00:25It is a very important concept.
00:28We are doing a technology,
00:33and we are doing a technology,
00:35and we are doing tools to procure.
00:38We can't do anything in Kerala.
00:41There is a corporate corporate team in Kerala.
00:44There is no investigation system.
00:49We are doing a small business in Spain.
00:53We are doing a small business in Kerala.
00:58We are doing a small business in Kerala.
01:00We are doing a small business in Kerala.
01:02We are doing a small business in Kerala.
01:04We are doing a small business in Kerala.
01:07zenal business in Kerala.
01:08We have up-agement in Kerala programs in Kerala.
01:10So, for our customers in Kerala is always doing an operational security.
01:16There are kids that need from the Hospital of Kerala.
01:18There that is,
01:20we care about that.
01:22But it's not fun for Ok assسب,
01:25If you have any IP address, you can use any IP address, etc.
01:31You can use the monitoring of the monitoring.
01:34You can use Europol, Interpol, and other agencies.
01:39You can use drugs, drug sites, cyber attackers, etc.
01:49So, the systems are available.
01:51We need to do proactivize the systems that are in the entry node, exit node, etc.
02:00So, these are the things that are very important.
02:03This is a big issue.
02:06If we operate in India, even if we are in the local law enforcement agencies,
02:12we can operate in the local law enforcement agencies.

Recommended