Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Protecting Intellectual Property (IP) in the Supply Chain

Data security policies are most often targeted around insider threats and external attackers, but your distributors can equally put intellectual property (IP) protection and other sensitive data at risk. IP is arguably a business’s most valuable asset and can take the form of product designs, software code, media content, etc. Protecting your IP is important because it allows your business to maintain a competitive edge in the market and generate revenue from your innovation.

A Guide to Controlled Unclassified Information (CUI) Markings

Defense contractors and suppliers have anxiously been awaiting news on the roll-out date for CMMC 2.0. The DoD previously indicated it would publish a final or interim final rule in 2023 to formally implement the CMMC program and contractor compliance with its requirements. There is some indication that it will now be issued as a proposed rule in May of 2023.

Securing Multinational Coalition Collaboration with Data-Centric Security

In today’s digital age, responding to multi-national threats, peacekeeping missions, and combat operations, all with numerous stakeholders involved, requires the twin challenges of information security and information sharing to be confronted and successfully addressed. This is especially true when sharing sensitive or classified information on military operational plans and supporting intelligence data seamlessly.

archTIS NC Encrypt Integrates with Thales CipherTrust Manager to Secure Business Critical Content in Microsoft Applications

Recently, archTIS worked with fellow Microsoft Intelligent Security Association (MISA) member, Thales to integrate NC Encrypt with CipherTrust Manager. MISA members are top experts from across the cybersecurity industry with the shared goal of improving customer security. Both companies offer advanced data security for the Microsoft Purview Information Protection suite and worked together on a joint solution for customers aiming to achieve digital sovereignty.

archTIS is a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist

archTIS is proud to announce we have been recognized as a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist for our unique solution for solving Defense requirements for the safe handling of and application of visual markings for sensitive, Controlled Unclassified Information (CUI) and classified data.

6 Steps to Prepare Data Before SharePoint Migration to Microsoft 365

A Cloud data migration project can be a complicated procedure that requires much planning, coordination, and management to ensure successful outcomes. There are many risks to consider including data quality control, over-exposure, data loss and the costs involved, particularly when it comes to large volumes of specialized data. When an organization is considering a SharePoint migration to Microsoft 365 (M365), they must prepare their data to mitigate these risks to ensure a successful outcome.

5 Top Microsoft Teams Security Concerns

Are you worried about rolling out Microsoft Teams? Are you concerned that users may accidentally share the wrong information with Team members? Your concern is justified with 56% of insider incidents caused by employee or contractor negligence at a cost of $484,931 per incident (2022 Ponemon Cost of Insider Threats Global Report).

Managing Administrator Privileges for Australia's Essential Eight Cybersecurity Compliance

The concept of least privileged access has been around for a while and is widely understood. However, overprivileged users with more rights than necessary, such as administrators, continue to be a common source of breaches. It’s such a concern that the restriction of administrative privileges is included as one of the Australian Government’s Essential Eight Maturity Model to mitigate cybersecurity incidents.

BYOD Security: Using ABAC to Manage Access to Sensitive Data

The concept of Bring Your Own Device, or BYOD, has been adopted by organizations wanting to take advantage of the benefits. BYOD allows employees to use their personal devices to connect to their business networks and access work-related resources using smartphones, personal laptops, tablets and USB keys. But is a BYOD strategy good for security? Along with the benefits come increased BYOD security risks that require mitigation.

Understanding Australia's SLACIP and SoNS Requirements for Critical Infrastructure

The Australian Security Legislation Amendment (Critical Infrastructure Protection) Act 2022 (SLACIP Act) and Systems of National Significance (SoNS) regulations are aimed at improving the resilience and risk management practices of Australia’s Critical Infrastructure sector and making it easier for organisations and governments to securely share information.