Go Unlimited with Magzter GOLD

Go Unlimited with Magzter GOLD

Get unlimited access to 10,000+ magazines, newspapers and Premium stories for just

$149.99
 
$74.99/Year

Try GOLD - Free

A CLEAN SLATE

Security Advisor Middle East

|

February 2020

DATA IS GROWING AT AN INCREDIBLE PACE AND IT WILL ONLY CONTINUE TO DO SO IN THE COMING YEARS. RECENT INDUSTRY REPORTS HIGHLIGHTED THAT A FULL 90 PERCENT OF ALL THE DATA IN WORLD HAS ONLY BEEN GENERATED OVER THE LAST TWO YEARS. BUT WHAT DO YOU DO WITH DATA WHEN IT’S NO LONGER NECESSARY FOR THE COMPANY AND HOW DO YOU MAKE SURE THAT IT DOESN’T FALL INTO THE WRONG HANDS? SECURITY CORRESPONDENT DANIEL BARDSLEY INVESTIGATES.

- Daniel Bardsley

A CLEAN SLATE

The Idaho Power Company hit the headlines for all the wrong reasons in 2006 when it came to light that hard drives from the firm containing customer data were being sold on eBay.

It transpired that the company’s policy on wiping drives had not been followed before the devices had been put up for sale, leaving company officials scrambling to track down the items.

Although the firm was successful in recovering most of the more than 200 hard drives that it had sold on, the episode remains a cautionary tale as to what can happen when not enough care is taken with old hardware.

There was a time not that long ago when destroying sensitive data was a relatively straightforward affair, involving little more than tearing up letters and documents and dropping them in the waste bin.

Often the closest methods got to being high-tech was if a pair of stainless-steel shredding scissors boasting multiple blades or a mechanical shredder was used.

While these fairly simple devices were sufficient for a world in which documents were paper-only, destroying electronic data can be much more complex.

Indeed, it is so complex that multiple terms have been developed to cover the myriad ways in which devices might be made safe.

MORE STORIES FROM Security Advisor Middle East

Security Advisor Middle East

Security Advisor Middle East

STARLINK SHARPENS AI-FIRST CYBERSECURITY VISION TO POWER KSA'S NEXT DECADE OF GROWTH

COO AHMED DIAB OUTLINES HOW DEEPER LOCAL INVESTMENT, AGENTIC AUTOMATION, AND VERTICAL-READY SOLUTIONS ARE POSITIONING STARLINK AT THE FOREFRONT OF THE KINGDOM'S CYBER RESILIENCE JOURNEY.

time to read

3 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

AI AGENTS, MACHINE IDENTITIES TO RESHAPE BOARDROOM CYBERSECURITY PRIORITIES

KEVIN BOCEK, SENIOR VICE PRESIDENT OF INNOVATION AT CYBERARK, EXPLAINS WHY IDENTITY SECURITY WILL DEFINE GOVERNANCE, RESILIENCE AND DIGITAL TRUST IN 2026 AS AI AGENTS AND AUTOMATION RESHAPE CORPORATE DECISION-MAKING IN THE GULF AND BEYOND.

time to read

3 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

GROUP-IB CHARTS NEXT FRONTIER OF CYBER DEFENCE IN SAUDI ARABIA

DMITRY VOLKOV HIGHLIGHTS HOW AI-DRIVEN THREATS, PREDICTIVE SECURITY, AND REAL-TIME FRAUD INTELLIGENCE SHARING ARE RESHAPING THE KINGDOM'S CYBERSECURITY ECOSYSTEM.

time to read

3 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

VEEAM POSITIONS TRUSTED DATA AS FOUNDATION FOR SCALING SAFE AI, SAYS

CEO ANAND ESWARAN EXPLAINS HOW THE ACQUISITION OF SECURITI AI UNIFIES DATA RESILIENCE, SECURITY, GOVERNANCE, AND AI TRUST TO HELP ENTERPRISES MOVE AI FROM EXPERIMENTATION TO PRODUCTION WITH CONFIDENCE

time to read

3 mins

December 2025

Security Advisor Middle East

GITGUARDIAN ENTERS SAUDI ARABIA TO STRENGHTEN CYBERSECURITY FOR VISION 2030

GitGuardian, global leader in nonhuman identity cybersecurity, has officially entered the Saudi Arabian market by completing a 12-day strategic immersion under Business France's Booster Grow Global program.

time to read

3 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

GOODBYE 2025, HELLO 2026! CYBER MATURITY MOVES FROM CONFIDENCE TO PROOF

CYBERSECURITY IN THE MIDDLE EAST IS SHIFTING FROM POINT CONTROLS TO ECOSYSTEM RESILIENCE. ATTACKERS ARE EXPLOITING THE SEAMS BETWEEN CLOUD PLATFORMS, AI-DRIVEN APPLICATIONS, PARTNERS, AND SUPPLIERS — WHILE BOARDS AND INSURERS DEMAND PROOF THAT CRITICAL DATA CAN BE RECOVERED CLEANLY, QUICKLY, AND WITHIN JURISDICTION. IN 2026, CYBER MATURITY WILL BE MEASURED, NOT ASSUMED.

time to read

12 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

REDEFINING TRUST: WHY CREDENTIALS, NOT PASSWORDS, WILL SECURE ENTERPRISE

CRYPTOGRAPHIC, SYSTEM-GOVERNED CREDENTIALS ARE BECOMING THE ONLY SCALABLE FOUNDATION FOR ZERO TRUST SECURITY BEYOND PASSWORDS.

time to read

5 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

HYBRID VISIBILITY, AI OBSERVABILITY, AND POST- QUANTUM READINESS WILL DEFINE 2026, SAYS GIGAMON OFFICIAL

DANIELLE KINSELLA, SENIOR DIRECTOR SALES ENGINEERING, GIGAMON, EXPLAINS HOW SAUDI ENTERPRISES ARE LEAPFROGGING GLOBAL MARKETS THROUGH GROUND-UP ARCHITECTURES, MULTICLOUD RESILIENCE AND TRAFFIC INTELLIGENCE.

time to read

2 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

DATA-CENTRIC SECURITY TAKES CENTRE STAGE IN SAUDI ARABIA'S DIGITAL TRANSFORMATION

SECLORE'S URAZ FARUKH EXPLORES HOW THE KINGDOM'S REGULATORY DIRECTION AND AI ADOPTION ARE SHAPING THE FUTURE OF COMPLIANCE AND CYBER RESILIENCE.

time to read

2 mins

December 2025

Security Advisor Middle East

Security Advisor Middle East

SANS INSTITUTE PARTNERS WITH UAE CYBERSECURITY COUNCIL TO ENHANCE NATIONAL CYBER CAPABILITIES AHEAD OF QUANTUM ERA

SANS Institute, the global leader in cybersecurity training and certifications, announced a landmark strategic partnership with the UAE Cybersecurity Council to advance the nation's cybersecurity readiness and reinforce the UAEs long-term vision for a secure and resilient digital future.

time to read

2 mins

December 2025

Translate

Share

-
+

Change font size