News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
SEM
SEM
Company
Global leader in high security information end-of-life solutions for over 50 years
Content brought to you by SEM
FISMA Requirements: Are You Compliant?
Blog
23 November 2021
The NSA EPL: The Policy that Protects Your Data
Blog
10 November 2021
Classification Breakdown: Match Your Data to its Destruction Method
Blog
3 November 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 October 2021
Data Security in an Unsecure World
Blog
26 October 2021
Is In-House Data Destruction Really Necessary? The Answer Is a Big Yes!
Blog
20 October 2021
Cost of a Data Breach vs. Hard Drive Crusher: How You Can Save Millions
Blog
18 October 2021
Level 6 Data Centers: Best Practices in Security
Blog
11 October 2021
Records Retention Schedules: When Will Your Data Expire?
Blog
4 October 2021
The Growing Size of Media: Just How Much Information Can Be Stored on 1TB?
Blog
27 September 2021
Debunking Hard Drive Destruction Misconceptions
Blog
20 September 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 September 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 July 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 June 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 June 2020
A Country in Crisis: Data Privacy in the US
Blog
5 June 2020
Who is Responsible for End-of-Life Data Destruction?
Blog
21 May 2020
Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
Blog
12 May 2020
Why Data Centers Need Formal Data End-of-Life Processes
Blog
29 April 2020
Data Security and Decommissioning in a 5G and Streaming World
Blog
22 April 2020
Data Destruction and the Environment
Blog
10 April 2020
The Missing Link in Cloud Security
Opinion
2 April 2020
Best Practices in Designing a Data Decommissioning Policy
Blog
18 March 2020
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers
News
15 May 2026
1
Bank of England, FCA and Treasury Raise Alarm Over Frontier AI
News
18 May 2026
2
China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer
News
15 May 2026
3
Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack
News
13 May 2026
4
Avada Builder Flaws Expose One Million WordPress Sites
News
13 May 2026
5
Interpol Launches Sweeping Cybercrime Crackdown in MENA Region
News
18 May 2026
6
Interview: How Alpine’s Head of IT Secures the High-Speed Environment of an F1 Team
Interview
14 May 2026
1
ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign
News
11 May 2026
2
What Fronter AI Models Like Mythos and GPT-Cyber Mean for Modern Cybersecurity
News Feature
15 May 2026
3
Google Launches Android Spyware Forensics Tool for High-Risk Users
News
14 May 2026
4
ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks
News
14 May 2026
5
OpenAI Launches 'Daybreak' to Help Build Secure By Design Software
News
12 May 2026
6
Financial Services Under Pressure: Supply Chain Risk, Regulation and Operational Resilience
Webinar
15:00 —
16:00, 30 April 2026
1
Behind the Curtain of Microsoft 365 Cybersecurity: Lessons from Overlooked Resilience Gaps
Webinar
15:00 —
16:00, 23 April 2026
2
Why Resilience‑Focused Cloud Design Is Your Best Defense Against Modern Attacks
Webinar
18:00 —
19:00, 9 April 2026
3
How to Harness Advanced Intelligence Capabilities to Strengthen Cyber Defence
Webinar
15:00 —
16:00, 12 March 2026
4
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
5
Agentic AI in the Wild: Security Risks and the Rise of Non-Human Identities
Webinar
16:40 —
17:40, 28 April 2026
6
Anthropic Rolls Out Claude Security for AI Vulnerability Scanning
News
1 May 2026
1
Inside the Code War: Defending Against Nation-State Cyber Threats
Podcast
20 April 2026
2
Interview: How YKK Is Securing the World’s Largest Zipper Manufacturing Operation
Interview
30 April 2026
3
CISA and Partners Publish Zero Trust Guidance For OT Security
News
30 April 2026
4
Most Cybersecurity Professionals Feel Undervalued and Underpaid
News
27 April 2026
5
Cyber Resilience Under Pressure: Can Your Organisation Prove Control When it Matters Most?
Webinar
11:00 —
12:00, 21 May 2026
6
Close