Recent Articles

Is It Time to Update Your IT Security Policies?

While technology developments come fast and furious, the policies that govern them often aren’t agile enough to keep up. And, when it comes to IT security policies, new technologies aren’t the only factors that can leave your standard protection methods outdated: Changes in business structure, regulation, the value of your data, the speed of data collection and increased malicious activity can also lessen their effectiveness. All of this leaves even … Read More

Data Sanitization Enters “Slope of Enlightenment” on Gartner Hype Cycle

The Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. In addressing data sanitization in the Gartner Hype Cycle for Data Security, 2019,1 Hype Cycle for Privacy, 20192 and Hype Cycle for Endpoint Security, 2019,3 Gartner analysts have provided the following definition: “data sanitization is the disciplined process … Read More

How Many Times Must You Overwrite a Hard Disk for Complete Data Erasure?

The safest and most cost-effective way to make data disappear without having to destroy a hard disk drive (HDD) is to simply overwrite it. But how many overwriting passes are sufficient? Or, as some put it, how many times do you write ones, zeroes, or other junk data to a hard drive before it is completely wiped? It may be fewer than you think. … Read More

Need to Erase Mac T2 Devices? Blancco Has You Covered.

Apple’s latest Mac mini, MacBook Pro, MacBook Air and iMac Pro all use the T2 chip with secure boot. Secure boot acts like an exclusive club’s sharply dressed but no-nonsense bouncer, disallowing access for even the most well-dressed nonmembers—in this case, the majority of drive erasure software. However, that doesn’t mean you have to give up removing confidential data from your Mac devices—even if you have tens, hundreds or thousands … Read More

Enterprise Data Erasure:
Your Last Line of Defense
Download the White Paper
how to securely erase different ssds
White Paper
How to Securely Erase Different SSDs: NVMe, PCIe and More
Download Now
desktop erasure
Case Study
Globe Telecom Data Erasure Case Study
Read Case Study

Top Categories