Blog

Stay up to date on industry trends, security advice, product news and more.

DISP: Securing the Australian Defence Supply Chain

DISP: Securing the Australian Defence Supply Chain

Understanding DISP requirements and security strategies to quickly increase your organisation's compliance and cyber resiliency.
Microsoft 365 GCC High Guide for DoD Contractors

Microsoft 365 GCC High Guide for DoD Contractors

Understanding Microsoft 365 Commercial, GCC, GCC High and DoD offering differences to meet the compliance and security requirements for defence contractors.
archTIS wins the 2023 Australian Defence Industry Award for Cyber Business of the Year two years in a row

archTIS wins the 2023 Australian Defence Industry Award for Cyber Business of the Year two years in a row

archTIS has won the 2023 Australian Defence Industry Award for Cyber Business of the Year for the second year running.
Introducing Data-centric Policy-enforced Access Control and Data Protection for NetApp ONTAP

Introducing Data-centric Policy-enforced Access Control and Data Protection for NetApp ONTAP

A NetApp Technology Alliance Program Preferred Partner, archTIS’ NC Protect now adds data-centric, dynamic policy-based access and security controls to NetApp ONTAP Windows File Share content.
Meet Us at DSEI UK and Microsoft Aerospace and Defense Summit Next Week

Meet Us at DSEI UK and Microsoft Aerospace and Defense Summit Next Week

We are excited to share the upcoming Defense Industry events that archTIS will be showcasing our solutions at next week. If you’re attending, please stop by to learn about our unique solutions to safeguard sensitive and classified information.
Data Sovereignty & Key Management Best Practices in M365

Data Sovereignty & Key Management Best Practices in M365

Tips for understanding and achieving compliance with data sovereignty regulations in M365 and other cloud services.
archTIS Shortlisted for Two 2023 Australian Defence Industry Awards

archTIS Shortlisted for Two 2023 Australian Defence Industry Awards

We are proud to share that archTIS has been shortlisted for two 2023 Australian Defence Industry Awards. The company has been named a Finalist for Cyber Business of the Year, and Managing Director and CEO Daniel Lai is nominated for Executive of the Year.
archTIS Receives Ellect’s Silver Star of Gender of Equality Marking a Rare Achievement in the Cybersecurity Industry

archTIS Receives Ellect’s Silver Star of Gender of Equality Marking a Rare Achievement in the Cybersecurity Industry

archTIS is proud to announce we have been recognized by Ellect as the most inclusive information security company on the Australian Securities Exchange (ASX).
ITAR and EAR Compliance in Microsoft 365 and SharePoint

ITAR and EAR Compliance in Microsoft 365 and SharePoint

If you're using Microsoft 365 or SharePoint and need to comply with ITAR and EAR export controls read this blog to learn what's required.
Understanding the Differences Between DFARS and CMMC

Understanding the Differences Between DFARS and CMMC

Discover the Differences Between DFARS and CMMC to meet compliance and safeguard US DoD sensitive information and CUI.
Solving Privileged Access Management Challenges in Microsoft 365 & SharePoint

Solving Privileged Access Management Challenges in Microsoft 365 & SharePoint

How to prevent sensitive and classified data leaks and overexposure stemming from privileged accounts in Microsoft 365 and SharePoint.
New Integration Between NC Protect and Janusseal Offers Robust Classification and Dynamic Data Protection for Customers

New Integration Between NC Protect and Janusseal Offers Robust Classification and Dynamic Data Protection for Customers

archTIS has partnered with Janusnet, a global leader in data classification, to offer robust classification and dynamic data protection for joint Defence and industry customers looking to implement data-centric zero trust security to protect sensitive information.
As seen in Defence Connect: Managing information security risk to compete for AUKUS business

As seen in Defence Connect: Managing information security risk to compete for AUKUS business

As seen in Defence Connect, archTIS’s Tony Howell discusses the opportunities and cybersecurity implications of AUKUS for Defence suppliers with Editor Liam Garman.
UK Security Policy Framework and Government Security Classifications Compliance

UK Security Policy Framework and Government Security Classifications Compliance

Understanding UK Government Security Classifications (GSC) data classification and marking requirements. Plus, how to automate compliance with data-centric information protection.
Australia’s Defence Strategic Review and Data Centric Security

Australia’s Defence Strategic Review and Data Centric Security

Explore Australia’s new Defence Strategic Review (DSR) requirements and their impact on Defence and Defence industry security practices.
Achieving NATO STANAG 4774 and 4778 Compliance

Achieving NATO STANAG 4774 and 4778 Compliance

Understanding NATO STANAG 4774 and 4778 classification requirements. Plus tips for automating the classification process and implementing access control to meet compliance.
Data Encryption At Rest vs In Motion in Microsoft 365

Data Encryption At Rest vs In Motion in Microsoft 365

Encryption is an essential tool for enterprise data security. Understand the differences between data at rest vs in motion and the types of encryption available.
Protecting Intellectual Property (IP) in the Supply Chain

Protecting Intellectual Property (IP) in the Supply Chain

Data security policies target insider threats and external attackers, but your supply chain can equally put IP protection at risk. Discover how to protect IP with dynamic watermarks.