Blog

Stay up to date on industry trends, security advice, product news and more.

Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR

Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR

The new export control material capability in Kojensi SaaS v2.0 assists supply chain organisations with the management of U.S. International Traffic in Arms Regulations (ITAR) regulated information, including Controlled Unclassified Information (CUI).
Singapore’s PDPA Penalties Set to Increase Starting Oct 1

Singapore’s PDPA Penalties Set to Increase Starting Oct 1

What you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.
Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

Explore 5 practical use cases for discovering and protecting sensitive data in M365 and SharePoint on-premises with NC Protect.
Controlled Unclassified Information (CUI) Marking Requirements & Management in M365

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365

With renewed focus on protecting CUI and several regulations the government is handling, including CMMC 2.0, understanding the controlled unclassified information marking requirements and DoD guidelines is critical.
Tips for Managing Unstructured Data Security

Tips for Managing Unstructured Data Security

Explore the unstructured data security and protection controls needed to ensure only the right users have access to the right content at the right time.
Managing the Scramble for Meeting ITAR Compliance

Managing the Scramble for Meeting ITAR Compliance

Selling to the Department of Defence or dealing with Export Controlled material? Discover how to manage the information security and compliance of ITAR and other regulated data
Managing Microsoft 365 Guest Access

Managing Microsoft 365 Guest Access

Discover how to easily and effectively secure and audit Guest access across your Microsoft 365 applications.
DFARS Compliance in Microsoft 365

DFARS Compliance in Microsoft 365

Understanding DFARS compliance requirements for CUI stored, collaborated on and shared in Microsoft 365 Applications.
Introducing NC Protect’s New CUI Designator Labelling Capability for US Defense Requirements

Introducing NC Protect’s New CUI Designator Labelling Capability for US Defense Requirements

We're pleased at announce a new NC Protect watermarking feature to support CUI Designator labelling capability to assist US Defense and the Defense Industrial Base (DIB) with meeting the new CUI document handling and tagging requirements.
Join archTIS at Eurosatory in Paris and Infosecurity Europe in the UK this June

Join archTIS at Eurosatory in Paris and Infosecurity Europe in the UK this June

archTIS will be exhibiting at several events in Europe this June; Eurosatory and Infosecurity Europe. Read on to learn more about the activities planned and what we will be showcasing at these two major European security events.
NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

We are excited to share that NC Protect for Microsoft 365 is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!
Missed last week’s Defense & DIB Cybersecurity Summit? Watch the recording

Missed last week’s Defense & DIB Cybersecurity Summit? Watch the recording

Miss last week's archTIS Defense & DIB Cybersecurity Summit with leading industry and defense experts? Watch the recording for their insights on the zero trust, #CMMC 2 and the new threats the industry is facing and how to best combat them.
5 Key Considerations for Microsoft Teams Security

5 Key Considerations for Microsoft Teams Security

5 common pitfalls to avoid in order to ensure your users can reap the productivity benefits of Teams without inadvertently causing a data security incident or breach.
Technical Spotlight: How to Protect and Watermark CAD Files

Technical Spotlight: How to Protect and Watermark CAD Files

Today's technical spotlight covers how to protect and watermark CAD Files to help prevent data loss and IP theft, and meet Defense compliance requirements such as CMMC.
Adopting a Security vs Compliance Focused Posture

Adopting a Security vs Compliance Focused Posture

When dealing with regulations you need to consider is your ultimate goal achieving "good enough" compliance or “truly focused” security?
Join archTIS on May 5th for our Cybersecurity Summit Featuring Prominent Government and Defense Industry Thought Leaders

Join archTIS on May 5th for our Cybersecurity Summit Featuring Prominent Government and Defense Industry Thought Leaders

Join archTIS for “Balancing Global Collaboration with Information Security: Best Practices for Tackling Defense and Supply Chain Challenges” to be held on Thursday, May 5, 2022 at AUSA Conference Center, Arlington, VA, 9:00 am – 12 Noon EDT. 
Australia and US Pledge More Government Cybersecurity Spend for 2022-23

Australia and US Pledge More Government Cybersecurity Spend for 2022-23

In the midst of a growing global cyberthreat landscape, the Australian and US governments this week announced plans to increase spend to bolster federal cybersecurity.
15 Ways to Protect Data with Digital Security Watermarks

15 Ways to Protect Data with Digital Security Watermarks

Learn how today’s security watermarks act as a digital thumbprint that travels with the document to prevent data loss and misuse.