California cops sign contract to begin using massive biometric database
The Los Angeles County Sheriffs Department the fourth largest local policing agency in the United States has taken another step…
By web-post | 2 minutes readThe Los Angeles County Sheriffs Department the fourth largest local policing agency in the United States has taken another step…
By web-post | 2 minutes readSecurity agencies of the US along with the Delhi Police, Central Industrial Security Force, Intelligence Bureau, besides air…
By web-post | 2 minutes readWhile the aviation industry has implemented strict security screening regulations, cruise ship security screening remains…
By web-post | 2 minutes readFrom Sony to The Home Depot and celebrity cellphones, it seemed like no one was immune to hackers in 2014. "The big lesson of…
By web-post | 2 minutes readLast months bomb blast on Church Street in Bangalore has woken up the police to the imperative of surveillance, and the need to…
By web-post | 2 minutes readIn a bid to ensure smart policing in the national capital, Delhi Police Commissioner BS Bassi has said that his force will…
By web-post | 1 minute readParliament and Supreme Court buildings may be facing serious fire hazard as they have not received a fire safety certificate for…
By web-post | 2 minutes readIn a bid to regulate private security companies, the Nepal government is set to introduce a license system and keep record of…
By web-post | 2 minutes readWith an aim to ensure foolproof security at city's banks and ATMs, Delhi government has decided to approach Reserve Bank of India…
By Kuber Singh | 1 minute readWhat can be considered as a serious security lapse, the Closed Circuit Television cameras installed inside the two buildings of…
By Kuber Singh | 2 minutes readThe American technology firm UST Global plans to set up a development center in Israel that will train thousands of software…
By web-post | 2 minutes readHID Global has earned the 2014 Frost & Sullivan Global New Product Innovation Leadership Award for consumer authentication in…
By web-post | 1 minute read