Blog
Stay up to date on industry trends, security advice, product news and more.
Subscribe

What Snowstorms Can Teach Us About Contextual Access and Data Interoperability
School closures depend on municipal data flows. See how contextual access turns siloed telemetry into trusted, decision-ready information during storms.

2025 Compliance Changes Review — What Organizations Must Know
The regulatory and compliance landscape evolved rapidly in 2025, with changes key changes affecting cybersecurity, privacy, and protective security. Get insights into the new requirements and how to ensure compliance in 2026.

2025 Data Security Insights and Resources to Prepare for 2026
2025 Data Security Insights
Data security in 2025 was less about reacting to breaches and more about surviving in ...

Season’s Greetings from the archTIS family to yours!
✨ Season's Greetings from the archTIS family to you and yours! ✨
Wishing everyone peace, joy, and laughter this ...

Navigating Security Clearance Portability in a Zero Trust World
Need to Know vs Need to Trust: Clearance Portability in Zero Trust Data Security
In today’s high-turnover work ...

Maximizing Microsoft Sensitivity Labels in Purview, SharePoint and other Microsoft 365 apps
Benefits and use cases of Microsoft Purview sensitivity labels in Microsoft 365, SharePoint, Microsoft Office, Outlook and Azure. Guidance on how to maximize their functionality and overcome limitations with third-party solutions.

CMMC and CUI Compliance Glossary: Key Terms and Phrases
Starting November 10, Phase 1 of the US Department of Defense’s CMMC 2.0 program went into effect, marking the ...

Connect with us at MilCIS 2025
archTIS is excited to share our data security insights at multiple sessions - please join us!

Embracing Zero Trust: Lessons from Australia’s Defence Supply Chain Data Breach
Recent cyber-attacks have revealed vulnerabilities within the defence supply chain, exposing sensitive data about Australia’s next-gen infantry fighting vehicles. Discover how implementing a defensive Zero Trust Data-centric Security approach can uplift supply chain security to prevent breaches.

CMMC 2.0: What to Expect and How to Secure FCI and CUI Now
Understand the new requirements and challenges of meeting CMMC 2.0 to safeguard FCI, CUI and other sensitive data.

Privacy and Other Legislation Amendment Act (POLA Act): Changes and Compliance Considerations
Understand Australia's Privacy and Other Legislation Amendment (POLA) Act POLA Act privacy law changes and how to align your data security and compliance efforts with the latest legal requirements.

What is Zero Trust Data Format (ZTDF)?
What is Zero Trust Data Format (ZTDF)? Secure communication across allied nations can be a challenge due to differing standards. The Zero Trust Data Format (ZTDF) addresses these issues by embedding data-centric access controls, allowing seamless and secure real-time data sharing. Discover how ZTDF is revolutionizing interoperability for secure mission partner sharing.

Join us at the Microsoft Defence Industry Symposium Next Week
archTIS is proud to be a sponsor of the Microsoft Defence Industry Symposium on Sept 15-16 in Adelaide. We look forward to meeting you at the Partner Showcase and engaging in discussions about securing industry collaboration and meeting compliance through technological innovation.

Australia’s 2025 Protective Security Policy Framework (PSPF) Now Mandates Zero Trust – What You Need to Know and Do
The 2025 Protective Security Policy Framework (PSPF) now requires Australian Government Entities to adopt Zero Trust principles. Discover how to enhance your cybersecurity strategies and cultivate a Zero Trust Culture in your organisation.

BYOK vs HYOK: What’s the Difference and Which Approach Is Right for You?
Learn the key differences between BYOK and HYOK encryption key management options to determine the best approach for your organization's data protection needs.

The Data Sovereignty Debate Heats Up
The debate over data sovereignty spurred by the US CLOUD Act is intensifying. As concerns grow about data control and privacy, the question arises: how can we effectively safeguard our data sovereignty? Discover the 4 steps to ensure data sovereignty and prevent unauthorized access.

Classifying and Protecting Sensitive Data in M365 and SharePoint On-Premises
Explore 5 practical use cases for classifying and protecting sensitive data in M365 and SharePoint on-premises with NC Protect.

Data Loss Prevention Guide for Microsoft 365 and SharePoint
Learn what DLP is, why it matters, and how to deploy it in Microsoft 365 and SharePoint—plus when to add archTIS for advanced, zero-trust protection.
No results found.