Recent Articles

What is NIST 800-88, and What Does “Media Sanitization” Really Mean?

NIST 800-88, published by the National Institute for Standards and Technology, is known for its media sanitization categories of Clear, Purge and Destroy. Its principles can apply to magnetic, flash-based, and other storage technologies. And, it can cover everything from mobile devices and USB drives to servers—or even technologies not yet developed. The latest update, NIST 800-88 Rev. 1, is one of the most widely used data sanitization standards requested … Read More

The Data that Remains: Testing Android Phones after Factory Resets

When it comes to mobile phones, the “circular economy” gives second-hand devices a longer life in the hands of users, reduces the need for purchasing brand-new phones, preserves resources and reduces the impact of digital waste on the environment. This often involves recycling materials and reusing components such as the microprocessor and memory storage in mobile devices. For example, if a smartphone has been damaged and doesn’t boot up anymore, … Read More

Everything You Need to Know About the DoD 5220.22-M Wiping Standard & Its Applications Today

When vendors state that their solutions meet the DoD 5220.22-M “standard,” it typically means that their software will write to all addressable hard drive locations with a character, its complement and a random character. It must then be followed by verification. This “three-pass” procedure is designed to prevent data from being recovered by commercially available processes. But is the DoD 5220.22-M standard the best wiping method for your organization? Read … Read More

MWC 2019: Foldable Phones, 5G and Insights on Consumer Privacy for the Fast-Growing Mobile Resale Market

How Are Consumer Privacy, Security and Government Regulation Affected by the Latest in Mobile Innovations? MWC Barcelona (#MWC19) debuted revolutionary changes, including the increased unveiling of 5G network use and the highly anticipated advent of foldable phones. Yet, in the wake of the massive “Collection 1” data exposure (followed by Collections 2-5), last year’s abundant data breaches and Facebook’s Cambridge Analytica misuse of consumer information—security and privacy in the mobile … Read More

Safely Destroying Dark &
Unstructured Data
Download the eBook
ultimate guide to data retention
Guide Book
Ultimate Guide to Data Retention
Download Now
mobile erasure
White Paper
Managing and Automating Data Erasure for Mobile Devices
Download Now

Top Categories