News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Heidi Parthena White
Heidi Parthena White
Director of Marketing, Security Engineered Machinery,
SEM
FISMA Requirements: Are You Compliant?
Blog
23 Nov 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 Oct 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 Sep 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 Jul 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 Jun 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 Jun 2020
A Country in Crisis: Data Privacy in the US
Blog
5 Jun 2020
Who is Responsible for End-of-Life Data Destruction?
Blog
21 May 2020
Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
Blog
12 May 2020
Why Data Centers Need Formal Data End-of-Life Processes
Blog
29 Apr 2020
Data Destruction and the Environment
Blog
10 Apr 2020
The Missing Link in Cloud Security
Opinion
2 Apr 2020
Best Practices in Designing a Data Decommissioning Policy
Blog
18 Mar 2020
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Only 5% of Boards Have Cybersecurity Expertise, Despite Financial Benefits
News
26 Mar 2024
1
Top 10 Cyber-Attacks of 2023
News Feature
12 Dec 2023
2
How to Open and View OST Files Without Outlook
Blog
21 Jul 2023
3
Don't Fall for the WhatsApp Gold Scam
News
7 Jan 2019
4
Dropbox Used to Steal Credentials and Bypass MFA in Novel Phishing Campaign
News
8 Mar 2024
5
Email Nightmare: 94% of Firms Hit by Phishing Attacks in 2023
News
16 Jan 2024
6
New Phishing Campaign Uses LinkedIn Smart Links in Blanket Attack
News
13 Oct 2023
1
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
2
US Government Releases New DDoS Attack Guidance for Public Sector
News
22 Mar 2024
3
NIST National Vulnerability Database Disruption Sees CVE Enrichment on Hold
News
15 Mar 2024
4
New AcidPour Wiper Targeting Linux Devices Spotted in Ukraine
News
22 Mar 2024
5
Police Bust Multimillion-Dollar Holiday Fraud Gang
News
25 Mar 2024
6
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
1
Disinformation Defense: Protecting Businesses from the New Wave of AI-Powered Cyber Threats
Webinar
20 Mar 2024
2
Understand and Combat the Top Healthcare Cloud Threats Today
Webinar
21 Mar 2024
3
Bouncing Back: Building Organizational Resilience in the Face of Cyber-Attack
Webinar
20 Mar 2024
4
Securing APIs in the Cloud Frontier
Webinar
20 Mar 2024
5
Untangling the Web: Navigating Third-Party Risk in a Hyperconnected World
Webinar
19 Mar 2024
6
Infosecurity Magazine Spring Online Summit 2024: Day One
Online Summit
09:45 GMT, 19 Mar
–
15:00 GMT, 20 Mar 2024
1
Infosecurity Magazine Spring Online Summit 2024: Day Two
Online Summit
10:45
–
16:00 EDT, 20 Mar 2024
2
Russia’s Midnight Blizzard Accesses Microsoft Source Code
News
11 Mar 2024
3
I-Soon GitHub Leak: What Cyber Experts Learned About Chinese Cyber Espionage
News Feature
27 Feb 2024
4
LockBit Takedown: What You Need to Know about Operation Cronos
News
26 Feb 2024
5
Women in Cybersecurity at Infosecurity Europe 2024
Magazine Event
16:00 PDT, 4 Jun 2024
6