Blog

Stay up to date on industry trends, security advice, product news and more.

Understanding the Differences Between Fine-Grained vs Coarse-Grained Access Control

Understanding the Differences Between Fine-Grained vs Coarse-Grained Access Control

Fine-grained vs coarse-grained access control: How to choose the best option for your data protection needs.
Defense Supply Chain Data Security

Defense Supply Chain Data Security

This blog examines the top threats, best practices and tools for securing defense supply chain data security.
Why Artificial Intelligence (AI) Is Neither

Why Artificial Intelligence (AI) Is Neither

What exactly is AI, and more importantly, how does it work? This blog delves into separating the facts from the hype.
Understanding the Differences Between DFARS and CMMC

Understanding the Differences Between DFARS and CMMC

Discover the Differences Between DFARS and CMMC to meet compliance and safeguard US DoD sensitive information and CUI.
DFARS 7012 Class Deviation and NIST 800-171 Rev 3 Guidance for DIBs

DFARS 7012 Class Deviation and NIST 800-171 Rev 3 Guidance for DIBs

archTIS talks to Robert Metzger, head of RJO’s DC office and Cybersecurity and Privacy practice chair, about the impact of the DFARS 7012 Class Deviation and NIST 800-171 Rev 3 on defense contractors.
The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

archTIS has won two awards in the 2024 Cybersecurity Excellence Awards in the National Cyber Defense and Data-centric Security categories.
Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

DoD controlled unclassified information (CUI) visual marking requirements and how to implement them in M365, Office 365 and GCC High.
What is Policy Orchestration?

What is Policy Orchestration?

Explore how Policy Orchestration simplifies the complexity of data access, security and governance to accelerate decision-making processes in the cloud.
Understanding ITAR Compliance: A Guide for Australian Companies

Understanding ITAR Compliance: A Guide for Australian Companies

To avoid ITAR risks, organisations must establish robust compliance programs and provide training to employees on the requirements for managing ITAR in Australia. Learn more in this ITAR checklist for Australian companies.
What is Attribute-Based Access Control or ABAC?

What is Attribute-Based Access Control or ABAC?

Learn about ABAC, the security model underpinning our solutions, and how it can be applied to secure collaboration of sensitive data.
archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer

archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer

archTIS is pleased to announce it is a Compliance & Privacy Trailblazer award finalist in the 2024 Microsoft Security Excellence Awards. The company was honored among a global field of industry leaders that demonstrated success across the security landscape during the past 12 months.
archTIS Inspires Inclusion to Support International Women’s Day 2024

archTIS Inspires Inclusion to Support International Women’s Day 2024

To celebrate International Women's Day our talented team members share their insights as ‘Women in Tech’ for those considering careers in the fields of technology and cybersecurity.
Safeguarding Classified Information

Safeguarding Classified Information

Understanding classified information handling requirements and technologies to help ensure information security obligations are enforced.
ITAR Compliance Checklist

ITAR Compliance Checklist

Comply with ITAR regulations and establish an effective ITAR compliance and information security program using this comprehensive checklist of best practices.
Best Practices to Address SharePoint Security Concerns

Best Practices to Address SharePoint Security Concerns

Modern collaboration improves productivity and communication, but also introduces information security risks. Explore best practices to address the top SharePoint security concerns.
NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

Explore the NIST SP 800-162 ABAC model and discover how NC Protect implements ABAC capabilities to enhance your Microsoft security framework.
Australia’s Six Cyber Shields and One Strategy to Rule Them All

Australia’s Six Cyber Shields and One Strategy to Rule Them All

The 2023-2030 Australian Cyber Security Strategy's Six Cyber Shields are critical. Discover how archTIS sovereign capability and information security software support them.
CMMC 2.0: What to Expect and How to Secure FCI and CUI Now

CMMC 2.0: What to Expect and How to Secure FCI and CUI Now

Understand the new requirements and challenges of meeting CMMC 2.0 to safeguard FCI, CUI and other sensitive data.