News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
SEM
SEM
Company
Global leader in high security information end-of-life solutions for over 50 years
Content brought to you by SEM
FISMA Requirements: Are You Compliant?
Blog
23 November 2021
The NSA EPL: The Policy that Protects Your Data
Blog
10 November 2021
Classification Breakdown: Match Your Data to its Destruction Method
Blog
3 November 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 October 2021
Data Security in an Unsecure World
Blog
26 October 2021
Is In-House Data Destruction Really Necessary? The Answer Is a Big Yes!
Blog
20 October 2021
Cost of a Data Breach vs. Hard Drive Crusher: How You Can Save Millions
Blog
18 October 2021
Level 6 Data Centers: Best Practices in Security
Blog
11 October 2021
Records Retention Schedules: When Will Your Data Expire?
Blog
4 October 2021
The Growing Size of Media: Just How Much Information Can Be Stored on 1TB?
Blog
27 September 2021
Debunking Hard Drive Destruction Misconceptions
Blog
20 September 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 September 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 July 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 June 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 June 2020
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
France Fines National Employment Agency €5m Over 2024 Data Breach
News
29 January 2026
1
Google Disrupts Extensive Residential Proxy Networks
News
29 January 2026
2
Number of Cybersecurity Pros Surges 194% in Four Years
News
29 January 2026
3
Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests
News
29 January 2026
4
Autonomous System Uncovers Long-Standing OpenSSL Flaws
News
28 January 2026
5
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
27 January 2026
6
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
28 January 2026
1
Securing AI for Cyber Resilience: Building Trustworthy and Secure AI Systems
Blog
8 December 2025
2
AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'
News
20 January 2026
3
Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Opinion
2 January 2026
4
Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
News
22 January 2026
5
CISA Releases List of Post-Quantum Cryptography Product Categories
News
26 January 2026
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
1
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
2
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
3
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6