Security Technology & Operations - Videos

10ff6a0a287abbe5e0f86947419348eb large

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance...
F38115501db8ca3b2c49d77b57e8b5f9 large

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform...
91a270bd6f8e2fb88e5167c789e7da15 large

PCI DSS 2.0: On the Right Track!

October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of...
GET HELP Contact Us
×
VL Methodology