Blog

Stay up to date on industry trends, security advice, product news and more.

NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

We are excited to share that NC Protect for Microsoft 365 is now available in both Microsoft Azure Marketplace and ...
Missed last week’s Defense & DIB Cybersecurity Summit? Watch the recording

Missed last week’s Defense & DIB Cybersecurity Summit? Watch the recording

Miss last week's archTIS Defense & DIB Cybersecurity Summit with leading industry and defense experts? Watch the recording for their insights on the zero trust, #CMMC 2 and the new threats the industry is facing and how to best combat them.
5 Key Considerations for Microsoft Teams Security

5 Key Considerations for Microsoft Teams Security

5 common pitfalls to avoid in order to ensure your users can reap the productivity benefits of Teams without inadvertently causing a data security incident or breach.
Technical Spotlight: How to Protect and Watermark CAD Files

Technical Spotlight: How to Protect and Watermark CAD Files

Today's technical spotlight covers how to protect and watermark CAD Files to help prevent data loss and IP theft, and meet Defense compliance requirements such as CMMC.
Adopting a Security vs Compliance Focused Posture

Adopting a Security vs Compliance Focused Posture

When dealing with regulations you need to consider is your ultimate goal achieving "good enough" compliance or “truly focused” security?
Join archTIS on May 5th for our Cybersecurity Summit Featuring Prominent Government and Defense Industry Thought Leaders

Join archTIS on May 5th for our Cybersecurity Summit Featuring Prominent Government and Defense Industry Thought Leaders

Join archTIS for “Balancing Global Collaboration with Information Security: Best Practices for Tackling Defense and Supply Chain Challenges” to be held on Thursday, May 5, 2022 at AUSA Conference Center, Arlington, VA, 9:00 am – 12 Noon EDT. 
Australia and US Pledge More Government Cybersecurity Spend for 2022-23

Australia and US Pledge More Government Cybersecurity Spend for 2022-23

In the midst of a growing global cyberthreat landscape, the Australian and US governments this week announced plans to increase spend to bolster federal cybersecurity.
15 Ways to Protect Data with Digital Security Watermarks

15 Ways to Protect Data with Digital Security Watermarks

Learn how today’s security watermarks act as a digital thumbprint that travels with the document to prevent data loss and misuse.
Microsoft 365 and Teams Secure File Sharing Tips

Microsoft 365 and Teams Secure File Sharing Tips

Microsoft 365 provides a powerful document management and collaboration platform. However, ensuring proper access and data security can be a challenge. In this blog we examine how to ensure secure file sharing in Microsoft 365 and Teams.
The women of archTIS share their experience and wisdom as Women in Tech

The women of archTIS share their experience and wisdom as Women in Tech

In honor of International Women’s Day the women of archTIS share their experience and wisdom as Women in Tech.
RBAC vs ABAC: Addressing Common Misconceptions

RBAC vs ABAC: Addressing Common Misconceptions

Understanding the two common approaches an organization can deploy: role-based access control (RBAC) vs attribute-based access control (ABAC) to safeguard data.
Case Study: Managing CUI Tagging and Protection in SharePoint

Case Study: Managing CUI Tagging and Protection in SharePoint

Discover how this Defense Manufacturer automated the management of Controlled Unclassified Information (CUI) in SharePoint to comply with numerous regulations for its safeguarding and dissemination controls.
CMMC 2.0: What to Expect and How to Secure FCI and CUI Now

CMMC 2.0: What to Expect and How to Secure FCI and CUI Now

Understand the new requirements and challenges of meeting CMMC 2.0 and other regulations to safeguard FCI, CUI and other sensitive data.
What is Data-centric Security?

What is Data-centric Security?

A data-centric security strategy shifts the approach from a company’s outer defences to making the data itself more secure.
Technical Spotlight: Managing Permissions Sprawl in Teams Chat and Associated OneDrive Folders

Technical Spotlight: Managing Permissions Sprawl in Teams Chat and Associated OneDrive Folders

Learn how to easily control permission sprawl and time-limit access to shared files in Teams chat and connected OneDrive accounts.
Modernizing Data Loss Prevention (DLP) Strategies with ABAC

Modernizing Data Loss Prevention (DLP) Strategies with ABAC

Discover how to implement a proactive, ABAC-powered data loss prevention (DLP) strategy to enable more secure and compliant collaboration.
What is Zero Trust Access and How to Employ It

What is Zero Trust Access and How to Employ It

The concept of “Zero Trust” (ZT) is quickly gaining steam as the preferred security methodology. Learn how to apply it to your data access and security processes.
The Top Insider Data Loss Causes and Preventions

The Top Insider Data Loss Causes and Preventions

Discover the top 10 ways insiders are contributing to data loss in your organization and how to prevent data loss and mishandling in the first place.