Blog

Stay up to date on industry trends, security advice, product news and more.

Understanding ITAR Compliance: A Guide for Australian Companies

Understanding ITAR Compliance: A Guide for Australian Companies

The United States and Australian Governments have established strict regulations to safeguard the technology that ...
What is Attribute-Based Access Control or ABAC?

What is Attribute-Based Access Control or ABAC?

Learn about ABAC, the security model underpinning our solutions, and how it can be applied to secure collaboration of sensitive data.
archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer

archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer

2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer archTIS is pleased to ...
archTIS Inspires Inclusion to Support International Women’s Day 2024

archTIS Inspires Inclusion to Support International Women’s Day 2024

To celebrate International Women's Day our talented team members share their insights as ‘Women in Tech’ for those considering careers in the fields of technology and cybersecurity.
Safeguarding Classified Information

Safeguarding Classified Information

Understanding classified information handling requirements and technologies to help ensure information security obligations are enforced.
ITAR Compliance Checklist

ITAR Compliance Checklist

Comply with ITAR regulations and establish an effective ITAR compliance and information security program using this comprehensive checklist of best practices.
Best Practices to Address SharePoint Security Concerns

Best Practices to Address SharePoint Security Concerns

Modern collaboration improves productivity and communication, but also introduces information security risks. Explore best practices to address the top SharePoint security concerns.
NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

Explore the NIST SP 800-162 ABAC model and discover how NC Protect implements ABAC capabilities to enhance your Microsoft security framework.
Australia’s Six Cyber Shields and One Strategy to Rule Them All

Australia’s Six Cyber Shields and One Strategy to Rule Them All

The 2023-2030 Australian Cyber Security Strategy's Six Cyber Shields are critical. Discover how archTIS sovereign capability and information security software support them.
CMMC 2.0: What to Expect and How to Secure FCI and CUI Now

CMMC 2.0: What to Expect and How to Secure FCI and CUI Now

Understand the new requirements and challenges of meeting CMMC 2.0 to safeguard FCI, CUI and other sensitive data.
Holiday Greetings from the archTIS Team

Holiday Greetings from the archTIS Team

Happy Holidays from archTIS. Wishing you a joyful holiday season filled with laughter and cheer.
Adding Multiple Watermarks to Protect IP in Microsoft Office Documents

Adding Multiple Watermarks to Protect IP in Microsoft Office Documents

Using multiple watermarks to ensure employees and third parties don’t share documents with IP outside of their intended audiences.
Permissions Auditing in Microsoft 365 and SharePoint

Permissions Auditing in Microsoft 365 and SharePoint

By conducting regular permissions audits in Microsoft 365 and SharePoint, organizations can ensure that their data and sensitive information remain safe and secure.
Find archTIS at IndoPacific and MiLCIS 2023 this November!

Find archTIS at IndoPacific and MiLCIS 2023 this November!

Meet us at these upcoming events We are excited to share that archTIS is exhibiting at IndoPacific and MilCIS this ...
Guard Data Against the Pirates of the Cyber Seas

Guard Data Against the Pirates of the Cyber Seas

Listen to this cautionary tale of modern data pirates this Halloween and heed our advice so loose data practices don’t sink your ship.
Maximizing Microsoft Sensitivity Labels in M365, SharePoint, Outlook and more

Maximizing Microsoft Sensitivity Labels in M365, SharePoint, Outlook and more

Benefits and use cases of Microsoft sensitivity labels in Microsoft 365, SharePoint, Microsoft Office, Outlook and Azure. Guidance on how to maximize their functionality and overcome limitations with third-party solutions.
Key Management & BYOK in Microsoft 365 for GDPR Compliance

Key Management & BYOK in Microsoft 365 for GDPR Compliance

Why Microsoft 365 Bring Your Own Key limitations pose potential data security and compliance issues, and solutions for adding BYOK to M365.
DISP: Securing the Australian Defence Supply Chain

DISP: Securing the Australian Defence Supply Chain

Understanding DISP requirements and security strategies to quickly increase your organisation's compliance and cyber resiliency.