Blog

Stay up to date on industry trends, security advice, product news and more.

[Webinar] Protecting IP with Microsoft Purview Information Protection and ABAC Policies

[Webinar] Protecting IP with Microsoft Purview Information Protection and ABAC Policies

Join archTIS’ Dave Matthews, Product Manager Governance and Compliance, and special guest Microsoft's Director, Director, Compliance and Privacy Ecosystem, Hammad Rajjoub, for a Webinar Tuesday, Feb 14th at 12:00pm EST/9am PST on how to enhance Microsoft Purview Information Protection with dynamic ABAC policies to prevent accidental and malicious data loss.
BYOD Security: Using ABAC to Manage Access to Sensitive Data

BYOD Security: Using ABAC to Manage Access to Sensitive Data

BYOD benefits also come with security risks that require mitigation. Learn how ABAC helps secure sensitive data to improve BYOD security.
Understanding Australia’s SLACIP and SoNS Requirements for Critical Infrastructure

Understanding Australia’s SLACIP and SoNS Requirements for Critical Infrastructure

Understanding CI-SoNS reform under the SLACIP Act for Critical Infrastructure protection in Australia and the requirements for secure data management.
Preventing the Theft of IP and Military Secrets

Preventing the Theft of IP and Military Secrets

How to balance the need for access with data-centric controls once access is granted to prevent IP and military secret theft.
Make Zero Trust Data Access Your New Year’s Resolution

Make Zero Trust Data Access Your New Year’s Resolution

As you look back on the state of cybersecurity in 2022 and set your security priorities for 2023, Zero Trust Data Access should top your New Year’s Resolutions list.
Happy Holidays from the archTIS Team

Happy Holidays from the archTIS Team

Happy Holidays from everyone at archTIS. We hope your holidays will be filled with joy and laughter through the ...
10 Data Protection Tips for 2023

10 Data Protection Tips for 2023

As you prepare for 2023 and what your organization can do to bolster data protection in the new year, read our top 10 viewed posts on security trends, best practices and new technologies from our weekly cybersecurity blog.
SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

SAP Secures Sensitive Government and Regulated Industry Data with Kojensi

Discover how Kojensi enables SAP to share and manage sensitive and classified information which cannot be stored and shared using SAP’s internal data systems to security requirements.
Complacency is Your Biggest Data Breach Risk: 5 Steps to Avoid It

Complacency is Your Biggest Data Breach Risk: 5 Steps to Avoid It

The ICO has stated that Complacency is a company’s biggest data breach risk. Take these 5 Steps to avoid data security complacency and a potential breach.
Join us at ESPC 22 in Copenhagen this November

Join us at ESPC 22 in Copenhagen this November

We are excited to share that archTIS is a Gold Sponsor and exhibitor at ESPC 22 in Stand #26, November 28 - December 3, 2022, in Copenhagen. Discover what we will be showcasing at this year's live in-person event.
Encrypting SharePoint List Columns

Encrypting SharePoint List Columns

Tips for managing access to and encrypting SharePoint List Columns to prevent unauthorized viewing of and access to sensitive column values.
4 Steps for Defining Data Classification Levels and Policies

4 Steps for Defining Data Classification Levels and Policies

Data classification is an important business process. Learn 4 important steps to build a data classification policy and automate enforcement.
Encryption Key Management in Microsoft 365

Encryption Key Management in Microsoft 365

Learn how to improve encryption and key management processes in collaboration tools including the Microsoft 365 suite.
What is FIPS 140-2?

What is FIPS 140-2?

Understanding NIST’s FIPS 140-2 security requirements for cryptographic modules including encryption software.
Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

CUI, which is maintained in government and contractor systems, is often a target and a cyber risk for the DOD, but the process of labeling and classifying CUI can be a complex endeavor. Learn how to tag, mark and protect it.
NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

We are excited to share that archTIS' NC Protect product has been named 2022 Policy Management Solution of the Year in the 6th annual Cybersecurity Breakthrough Awards.
How to Optimize Governance and Data Security in Microsoft 365 and Teams

How to Optimize Governance and Data Security in Microsoft 365 and Teams

Discover how dynamic data security that enforces governance more effectively secures collaboration in M365 and Teams without impacting productivity.
Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server

Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server

Introducing Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server for NC Protect Users.