News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
SEM
SEM
Company
Global leader in high security information end-of-life solutions for over 50 years
Content brought to you by SEM
FISMA Requirements: Are You Compliant?
Blog
23 November 2021
The NSA EPL: The Policy that Protects Your Data
Blog
10 November 2021
Classification Breakdown: Match Your Data to its Destruction Method
Blog
3 November 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 October 2021
Data Security in an Unsecure World
Blog
26 October 2021
Is In-House Data Destruction Really Necessary? The Answer Is a Big Yes!
Blog
20 October 2021
Cost of a Data Breach vs. Hard Drive Crusher: How You Can Save Millions
Blog
18 October 2021
Level 6 Data Centers: Best Practices in Security
Blog
11 October 2021
Records Retention Schedules: When Will Your Data Expire?
Blog
4 October 2021
The Growing Size of Media: Just How Much Information Can Be Stored on 1TB?
Blog
27 September 2021
Debunking Hard Drive Destruction Misconceptions
Blog
20 September 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 September 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 July 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 June 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 June 2020
A Country in Crisis: Data Privacy in the US
Blog
5 June 2020
Who is Responsible for End-of-Life Data Destruction?
Blog
21 May 2020
Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
Blog
12 May 2020
Why Data Centers Need Formal Data End-of-Life Processes
Blog
29 April 2020
Data Security and Decommissioning in a 5G and Streaming World
Blog
22 April 2020
Data Destruction and the Environment
Blog
10 April 2020
The Missing Link in Cloud Security
Opinion
2 April 2020
Best Practices in Designing a Data Decommissioning Policy
Blog
18 March 2020
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers
News
30 March 2026
1
IT and OT Are Not Equal. IT Can Fail. Your OT Cannot
Opinion
27 March 2026
2
Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code
News
26 March 2026
3
Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI
News
7 April 2026
4
How Security Leaders Can Safeguard Against Vibe Coding Security Risks
News Feature
6 April 2026
5
Researchers Observe Sub-One-Hour Ransomware Attacks
News
2 April 2026
6
The Death of the SIEM: Why Modern Security Demands a New Data Strategy
Blog
31 March 2026
1
How Security Leaders Can Safeguard Against Vibe Coding Security Risks
News Feature
6 April 2026
2
Researchers Observe Sub-One-Hour Ransomware Attacks
News
2 April 2026
3
Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI
News
7 April 2026
4
Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns
News
7 April 2026
5
New 'Storm' Infostealer Remotely Decrypts Stolen Credentials
News
2 April 2026
6
How to Maintain the Intelligence Edge in a Disrupted Threat Landscape
Webinar
15:00 —
16:00, 12 March 2026
1
How to Recover From a Cyber-Attack: A Step-by-Step Playbook
Webinar
11:00 —
11:30, 24 March 2026
2
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
3
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
4
How Trusted Time Strengthens Network Security
Webinar
15:00 —
16:00, 19 February 2026
5
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
6
Exclusive Interview with OpenClaw's Security Advisor
Podcast
13 March 2026
1
How Allianz Cyber Educator Daria Catalui Puts People First to Build a Human Firewall
Interview
23 March 2026
2
Why Resilience‑Focused Cloud Design Is Your Best Defense Against Modern Attacks
Webinar
18:00 —
19:00, 9 April 2026
3
AI Security and Governance Virtual Summit
Virtual Summit
14:10 —
18:50, 28 April 2026
4
High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports
News
23 March 2026
5
Tycoon2FA Phishing Service Resumes Activity Post-Takedown
News
23 March 2026
6
Close