News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
SEM
SEM
Company
Global leader in high security information end-of-life solutions for over 50 years
Content brought to you by SEM
FISMA Requirements: Are You Compliant?
Blog
23 November 2021
The NSA EPL: The Policy that Protects Your Data
Blog
10 November 2021
Classification Breakdown: Match Your Data to its Destruction Method
Blog
3 November 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 October 2021
Data Security in an Unsecure World
Blog
26 October 2021
Is In-House Data Destruction Really Necessary? The Answer Is a Big Yes!
Blog
20 October 2021
Cost of a Data Breach vs. Hard Drive Crusher: How You Can Save Millions
Blog
18 October 2021
Level 6 Data Centers: Best Practices in Security
Blog
11 October 2021
Records Retention Schedules: When Will Your Data Expire?
Blog
4 October 2021
The Growing Size of Media: Just How Much Information Can Be Stored on 1TB?
Blog
27 September 2021
Debunking Hard Drive Destruction Misconceptions
Blog
20 September 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 September 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 July 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 June 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 June 2020
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Skills Shortages Trump Headcount as Critical Cyber Challenge
News
4 December 2025
1
New GhostFrame Phishing Framework Hits Over One Million Attacks
News
4 December 2025
2
Yearn Finance yETH Pool Hit by $9M Exploit
News
3 December 2025
3
UK Ransomware Payment Ban to Come with Exemptions, Security Minster Say
News
3 December 2025
4
CISA and International Partners Issue Guidance for Secure AI in Infrastructure
News
4 December 2025
5
Cyber Agencies Push for Digital Trust Amid AI Era with New Provenance Report
News
4 December 2025
6
Australian Man Gets Seven Years for Running “Evil Twin” Wi-Fi
News
1 December 2025
1
#BHUSA: Microsoft and Google Among Most Affected as Zero Day Exploits Jump 46%
News
4 August 2025
2
Scattered Lapsus$ Hunters Take Aim At Zendesk Users
News
27 November 2025
3
Preparing for the Quantum Future: Lessons from Singapore
Blog
1 December 2025
4
French Football Federation Suffers Data Breach
News
28 November 2025
5
Gartner: 40% of Firms to Be Hit By Shadow AI Security Incidents
News
20 November 2025
6
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
1
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
2
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
3
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
14:00 —
16:00, 18 September 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6