Blog
Stay up to date on industry trends, security advice, product news and more.
Subscribe

Connect with us at MilCIS 2025
Will you be at MilCIS 2025 on 18-20 November?
archTIS is excited to share our data security insights at multiple ...

Embracing Zero Trust: Lessons from Australia’s Defence Supply Chain Data Breach
Recent cyber-attacks have revealed vulnerabilities within the defence supply chain, exposing sensitive data about Australia’s next-gen infantry fighting vehicles. Discover how implementing a defensive Zero Trust Data-centric Security approach can uplift supply chain security to prevent breaches.

Privacy and Other Legislation Amendment Act (POLA Act): Changes and Compliance Considerations
Understand Australia's Privacy and Other Legislation Amendment (POLA) Act POLA Act privacy law changes and how to align your data security and compliance efforts with the latest legal requirements.

What is Zero Trust Data Format (ZTDF)?
What is Zero Trust Data Format (ZTDF)? Secure communication across allied nations can be a challenge due to differing standards. The Zero Trust Data Format (ZTDF) addresses these issues by embedding data-centric access controls, allowing seamless and secure real-time data sharing. Discover how ZTDF is revolutionizing interoperability for secure mission partner sharing.

Join us at the Microsoft Defence Industry Symposium Next Week
archTIS is proud to be a sponsor of the Microsoft Defence Industry Symposium on Sept 15-16 in Adelaide. We look forward to meeting you at the Partner Showcase and engaging in discussions about securing industry collaboration and meeting compliance through technological innovation.

Australia’s 2025 Protective Security Policy Framework (PSPF) Now Mandates Zero Trust – What You Need to Know and Do
The 2025 Protective Security Policy Framework (PSPF) now requires Australian Government Entities to adopt Zero Trust principles. Discover how to enhance your cybersecurity strategies and cultivate a Zero Trust Culture in your organisation.

BYOK vs HYOK: What’s the Difference and Which Approach Is Right for You?
Learn the key differences between BYOK and HYOK encryption key management options to determine the best approach for your organization's data protection needs.

The Data Sovereignty Debate Heats Up
The debate over data sovereignty spurred by the US CLOUD Act is intensifying. As concerns grow about data control and privacy, the question arises: how can we effectively safeguard our data sovereignty? Discover the 4 steps to ensure data sovereignty and prevent unauthorized access.

Classifying and Protecting Sensitive Data in M365 and SharePoint On-Premises
Explore 5 practical use cases for classifying and protecting sensitive data in M365 and SharePoint on-premises with NC Protect.

Data Loss Prevention Guide for Microsoft 365 and SharePoint
Learn what DLP is, why it matters, and how to deploy it in Microsoft 365 and SharePoint—plus when to add archTIS for advanced, zero-trust protection.

Achieving NATO STANAG 4774 and 4778 Compliance
Understanding NATO STANAG 4774 and 4778 classification requirements. Plus tips for automating the classification process and implementing access control to meet compliance.

Transforming Defence Information Sharing & Collaboration with Zero Trust Solutions
Discover how to enable secure collaboration and sharing of Defence documents, ensuring that your information remains compartmentalised, secure, and compliant with regulations.

What is Multi-Level Security (MLS) and why is it important?
Implementing the right separation and information protections needed to meet defence requirements can be a challenge. Dynamic Multi-Level Security (MLS) offers a solution.

Understanding the U.S. Cloud Act: Impact on Compliance, Agreement, and Data Protection
The U.S. CLOUD Act presents challenges for global data governance. In this article, we explore how this pivotal legislation is reshaping compliance requirements and strategies, transforming privacy frameworks and challenging traditional concepts of data sovereignty.

What is FIPS 140-3?
Understanding the FIPS 140-3 standard, security levels, compliance requirements, and who must use FIPS 140 validated encryption tools.

Safeguarding Classified Information: How to Prevent Insider Data Breaches
The US military's recent classified information breach has brought to light a significant concern within the security industry known as insider threats. Learn about strategies to prevent them.

How to Identify and Protect Personal Information
Handling personal information and PII can be a daunting task for businesses. Learn how to identify and protect personal information in enterprise collaboration systems.

What is Sensitive Data? Sensitive Data Definitions, Types & Examples
Data security and data breaches are recurring topics in the IT world. While it’s vital to keep all data safe from exploitation, it’s even more vital to keep the so-called “sensitive data” safe from exposure. This discourse would expose you to the definition of sensitive data, what makes data sensitive, and how to protect information from exposure, and exploitation.
No results found.