News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Heidi Parthena White
Heidi Parthena White
Director of Marketing, Security Engineered Machinery,
SEM
FISMA Requirements: Are You Compliant?
Blog
23 November 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 October 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 September 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 July 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 June 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 June 2020
A Country in Crisis: Data Privacy in the US
Blog
5 June 2020
Who is Responsible for End-of-Life Data Destruction?
Blog
21 May 2020
Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
Blog
12 May 2020
Why Data Centers Need Formal Data End-of-Life Processes
Blog
29 April 2020
Data Destruction and the Environment
Blog
10 April 2020
The Missing Link in Cloud Security
Opinion
2 April 2020
Best Practices in Designing a Data Decommissioning Policy
Blog
18 March 2020
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures
News
28 April 2026
1
US Sanctions Target Cambodian Scam Network Leaders
News
27 April 2026
2
BlackFile Group Targets Retail and Hospitality with Vishing Attacks
News
27 April 2026
3
UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China
News
24 April 2026
4
AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns
News
24 April 2026
5
NCSC Backs Passkeys, Hailing a New Era of Sign-in
News
23 April 2026
6
AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns
News
24 April 2026
1
Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads
News
16 April 2026
2
UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’
News
22 April 2026
3
UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns
News
22 April 2026
4
How to Manage Large PST Files in Microsoft Outlook
Blog
28 June 2023
5
MacOS Native Tools Enable Stealthy Enterprise Attacks
News
22 April 2026
6
Strengthening Business Resilience Through Understanding the AI Cyber Threat Landscape
Webinar
14:50 —
15:50, 28 April 2026
1
Agentic AI in the Wild: Security Risks and the Rise of Non-Human Identities
Webinar
16:40 —
17:40, 28 April 2026
2
AI Governance as a Growth Enabler: How CISOs Align Security with Business Objectives
Webinar
17:50 —
18:50, 28 April 2026
3
Keynote: Identity for AI. Trust for Humanity
Webinar
14:10 —
14:40, 28 April 2026
4
Behind the Curtain of Microsoft 365 Cybersecurity: Lessons from Overlooked Resilience Gaps
Webinar
15:00 —
16:00, 23 April 2026
5
SANS Fireside Chat: Preparing Security Programs for the Mythos Era
Webinar
16:00 —
16:30, 28 April 2026
6
AI Security and Governance Virtual Summit
Virtual Summit
14:10 —
18:50, 28 April 2026
1
Exclusive Interview with OpenClaw's Security Advisor
Podcast
13 March 2026
2
CDW's Walt Powell on CISO 3.0 and Translating Cyber Risk into Business Value
Interview
16 April 2026
3
AI Companies to Play Bigger Role in CVE Program, Says CISA
News
15 April 2026
4
When Agentic AI Becomes Your Riskiest Third Party
Opinion
10 April 2026
5
How Security Leaders Can Safeguard Against Vibe Coding Security Risks
News Feature
6 April 2026
6
Close