Blog
Stay up to date on industry trends, security advice, product news and more.
A Guide to Controlled Unclassified Information (CUI) Markings
CUI must be marked accordingly to inform recipients/users that it is present and of any limited dissemination controls. Learn how to automate this process in Microsoft applications.
Securing Multinational Coalition Collaboration with Data-Centric Security
In today’s digital age, responding to multi-national threats, peacekeeping missions, and combat operations requires the twin challenges of data security and information sharing to be confronted and successfully addressed. Explore new technologies for safeguarding sensitive mission data to enable secure multinational coalition collaboration.
archTIS NC Encrypt Integrates with Thales CipherTrust Manager to Secure Business Critical Content in Microsoft Applications
Recently, archTIS worked with fellow Microsoft Intelligent Security Association (MISA) member, Thales to integrate ...
archTIS Celebrates International Women’s Day 2023
Meet the talented women of archTIS sharing their insights and wisdom with others seeking a career as ‘Women in Tech’.
archTIS is a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist
archTIS is proud to announce we have been recognized as a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer
6 Steps to Prepare Data Before SharePoint Migration to Microsoft 365
How to prepare your on-premises data to ensure a smooth SharePoint migration to M365 and SharePoint Online.
Managing Administrator Privileges for Australia’s Essential Eight Cybersecurity Compliance
Using ABAC to manage administrator access to meet Essential Eight compliance requirements and protect sensitive data.
[Webinar] Protecting IP with Microsoft Purview Information Protection and ABAC Policies
archTIS’ Dave Matthews, Product Manager Governance and Compliance, and Microsoft's Director, Compliance and Privacy Ecosystem, Hammad Rajjoub, present a recorded webinar on how to enhance Microsoft Purview Information Protection with dynamic ABAC policies to prevent accidental and malicious data loss.
BYOD Security: Using ABAC to Manage Access to Sensitive Data
BYOD benefits also come with security risks that require mitigation. Learn how ABAC helps secure sensitive data to improve BYOD security.
Understanding Australia’s SLACIP and SoNS Requirements for Critical Infrastructure
Understanding CI-SoNS reform under the SLACIP Act for Critical Infrastructure protection in Australia and the requirements for secure data management.
Preventing the Theft of IP and Military Secrets
How to balance the need for access with data-centric controls once access is granted to prevent IP and military secret theft.
Make Zero Trust Data Access Your New Year’s Resolution
As you look back on the state of cybersecurity in 2022 and set your security priorities for 2023, Zero Trust Data Access should top your New Year’s Resolutions list.
Happy Holidays from the archTIS Team
Happy Holidays from everyone at archTIS.
We hope your holidays will be filled with joy and laughter through
the ...
10 Data Protection Tips for 2023
As you prepare for 2023 and what your organization can do to bolster data protection in the new year, read our top 10 viewed posts on security trends, best practices and new technologies from our weekly cybersecurity blog.
SAP Secures Sensitive Government and Regulated Industry Data with Kojensi
Discover how Kojensi enables SAP to share and manage sensitive and classified information which cannot be stored and shared using SAP’s internal data systems to security requirements.
Complacency is Your Biggest Data Breach Risk: 5 Steps to Avoid It
The ICO has stated that Complacency is a company’s biggest data breach risk. Take these 5 Steps to avoid data security complacency and a potential breach.
Join us at ESPC 22 in Copenhagen this November
We are excited to share that archTIS is a Gold Sponsor and exhibitor at ESPC 22 in Stand #26, November 28 - December 3, 2022, in Copenhagen. Discover what we will be showcasing at this year's live in-person event.
Encrypting SharePoint List Columns
Tips for managing access to and encrypting SharePoint List Columns to prevent unauthorized viewing of and access to sensitive column values.