Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

archTIS

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

In July 2022, the Pentagon’s acquisition office issued a memo reminding acquisition officials of the DoD’s requirements for handling controlled unclassified information (CUI). The standard which applies to Defense contractors is not new. The original Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 requirement went into effect in 2017.

What is Policy Orchestration?

As an organization’s data volume grows, so does the need to manage its access and governance consistently and securely. The proliferation of vast and siloed data spread across diverse applications, multi-cloud and hybrid environments, and formats over the last few decades has made it difficult to control data access and governance. In order for structured data to be effectively utilized, it needs to be combined and enhanced in a way that supports both operational and analytical tasks.

Understanding ITAR Compliance: A Guide for Australian Companies

The United States and Australian Governments have established strict regulations to safeguard the technology that can be used for military applications. The most sensitive technology is regulated by the U.S. International Traffic in Arms Regulations (ITAR), and it is imperative for any company working with ITAR-controlled technologies and data to comply with these regulations. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

What is Attribute-Based Access Control or ABAC?

One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic, data-centric approach is key to securing sensitive information and achieving compliance.

archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer

archTIS is pleased to announce it is a Compliance & Privacy Trailblazer award finalist in the 2024 Microsoft Security Excellence Awards. The company was honored among a global field of industry leaders that demonstrated success across the security landscape during the past 12 months. We are extremely proud to be recognized as a finalist for the Compliance and Privacy Trailblazer award for the second year in a row.

Safeguarding Classified Information

Safeguarding classified information is paramount to the security of any nation and its allies. However, modern collaboration tools and devices have made protecting it more challenging without the proper guardrails. Understanding classified information handling requirements and the technologies that can help enforce these obligations are the keys to preventing unauthorised access, dissemination and exposure of classified information.

ITAR Compliance Checklist

The United States government has established strict regulations to safeguard intellectual property and military superiority. Compliance with the International Traffic in Arms Regulations (ITAR) is imperative for companies involved with U.S. defense technologies and data. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

Best Practices to Address SharePoint Security Concerns

Modern enterprises are increasingly relying on cloud collaboration to enhance their business productivity, efficiency, and communication. While these cloud-based solutions offer numerous benefits, they also come with a range of potential security risks. Among these risks, enterprise SharePoint security concerns are some of the most significant. It is essential to adopt best practices that can mitigate these risks and safeguard your organization’s valuable data and assets.

NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

NIST SP 800-162 ‘Guide to Attribute Based Access Control (ABAC) Definition and Considerations’ is a special publication that defines attribute-based access control (ABAC) for U.S. government agencies. It also provides guidance on using ABAC to improve and maintain control of information sharing within and between organizations and best practices for ABAC implementations.

Australia's Six Cyber Shields and One Strategy to Rule Them All

The newly unveiled 2023-2030 Australian Cyber Security Strategy (the Strategy) lays out six cyber shields to achieve the Australian Government’s goal of becoming a world leader in cyber security by 2030. It aims to substantially improve the country’s overall cyber security posture, the ability to manage cyber risks and respond to cyberattacks quickly.