Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

archTIS is excited to share that the company has been honored with two significant awards in the 2024 Cybersecurity Excellence Awards. Our products, Kojensi and NC Protect, have been recognized in the National Cyber Defense and Data-centric Security categories. We are proud to be acknowledged by the Cybersecurity Excellence Award judges for our commitment to excellence, innovation, and leadership in cybersecurity.

Empowering Your Defense: Synergy between Data Loss Prevention Controls and Automated Alert Remediation

In today's digital world, the stakes of data loss are high, and the cost of cybercrime continues to escalate. In fact, IBM recently estimated that the average cost of a data breach was $4.45 million in 2023, a 15% increase over the previous three years.

4 key takeaways from the 2024 Verizon Data Breach Investigations Report

It’s that time of year again: The 2024 Verizon Data Breach Investigations Report is back with the top trends in security breaches over the past year. Read on for an at-a-glance look of some of the report’s most interesting—and actionable—findings.

How to secure PHI with an identity governance solution

Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of data breaches. While patients, providers, and policymakers all have a stake in protecting health information, a critical weak point lies with the technology companies that offer electronic health record (EHR) systems. These systems hold a treasure trove of PHI, making them prime targets for cybercriminals.

Top 5 SaaS misconfigurations to avoid and why

Cloud storage services and SaaS apps like Google Drive and Microsoft OneDrive provide convenient, scalable solutions for managing documents, photos, and more—making them indispensable for modern work and personal life. However, misconfigured settings and permissions can lead to serious security breaches, noncompliance, and even the loss of customer trust. Let’s explore the 5 most common misconfiguration issues with real-world examples.

The Importance Of Call Recording Security

In today's rapidly evolving digital landscape, the way we communicate has transformed dramatically. The ability to forge and sustain social connections globally is a remarkable advancement. However, the issue of online privacy continues to be a significant challenge for both individual users and businesses.

5 Best Ways To Secure Your Brand's Reputation Online In 2024

You know the moment when you are in a different city and want to find a good restaurant, or even the new one in your neighborhood? This is probably something that all of us have experienced at some point in our lives. I always do the same - I take out my phone and check the reviews. It can be overwhelming how much a few bad comments can sway my opinion. And that's the power of online reputation.

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

In July 2022, the Pentagon’s acquisition office issued a memo reminding acquisition officials of the DoD’s requirements for handling controlled unclassified information (CUI). The standard which applies to Defense contractors is not new. The original Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 requirement went into effect in 2017.