Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

archTIS

Australia's Defence Strategic Review and Data Centric Security

Australia recently released the 2023 Defence Strategic Review (DSR) which identifies investments required to deliver the Australian Defence Force posture required by 2032-33. In this blog, we explore the new DSR requirements and their impact on Defence and industry security practices.

Achieving NATO STANAG 4774 and 4778 Compliance

Efforts to facilitate critical information sharing between multinational coalition partners, including traditional and non-traditional allies, have become more critical in light of recent conflicts. In addition, partner nations need to share and work together on highly classified information at different security classifications and clearances, which poses a challenge to multinational collaboration efforts.

Data Encryption At Rest vs In Motion in Microsoft 365

Data is the most important resource that a company possesses. Any data loss event can be extremely disruptive, with serious consequences including regulatory fines, major revenue loss, and reputational damage. Data encryption is crucial for any organizations that deal with sensitive data including customer and employee information, payment details, company financials, M&A documents, government and defense data, and more.

Protecting Intellectual Property (IP) in the Supply Chain

Data security policies are most often targeted around insider threats and external attackers, but your distributors can equally put intellectual property (IP) protection and other sensitive data at risk. IP is arguably a business’s most valuable asset and can take the form of product designs, software code, media content, etc. Protecting your IP is important because it allows your business to maintain a competitive edge in the market and generate revenue from your innovation.

A Guide to Controlled Unclassified Information (CUI) Markings

Defense contractors and suppliers have anxiously been awaiting news on the roll-out date for CMMC 2.0. The DoD previously indicated it would publish a final or interim final rule in 2023 to formally implement the CMMC program and contractor compliance with its requirements. There is some indication that it will now be issued as a proposed rule in May of 2023.

Securing Multinational Coalition Collaboration with Data-Centric Security

In today’s digital age, responding to multi-national threats, peacekeeping missions, and combat operations, all with numerous stakeholders involved, requires the twin challenges of information security and information sharing to be confronted and successfully addressed. This is especially true when sharing sensitive or classified information on military operational plans and supporting intelligence data seamlessly.

archTIS NC Encrypt Integrates with Thales CipherTrust Manager to Secure Business Critical Content in Microsoft Applications

Recently, archTIS worked with fellow Microsoft Intelligent Security Association (MISA) member, Thales to integrate NC Encrypt with CipherTrust Manager. MISA members are top experts from across the cybersecurity industry with the shared goal of improving customer security. Both companies offer advanced data security for the Microsoft Purview Information Protection suite and worked together on a joint solution for customers aiming to achieve digital sovereignty.

archTIS is a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist

archTIS is proud to announce we have been recognized as a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist for our unique solution for solving Defense requirements for the safe handling of and application of visual markings for sensitive, Controlled Unclassified Information (CUI) and classified data.

6 Steps to Prepare Data Before SharePoint Migration to Microsoft 365

A Cloud data migration project can be a complicated procedure that requires much planning, coordination, and management to ensure successful outcomes. There are many risks to consider including data quality control, over-exposure, data loss and the costs involved, particularly when it comes to large volumes of specialized data. When an organization is considering a SharePoint migration to Microsoft 365 (M365), they must prepare their data to mitigate these risks to ensure a successful outcome.

5 Top Microsoft Teams Security Concerns

Are you worried about rolling out Microsoft Teams? Are you concerned that users may accidentally share the wrong information with Team members? Your concern is justified with 56% of insider incidents caused by employee or contractor negligence at a cost of $484,931 per incident (2022 Ponemon Cost of Insider Threats Global Report).