Blog
Stay up to date on industry trends, security advice, product news and more.
4 Steps for Defining Data Classification Levels and Policies
Data classification is an important business process. Learn 4 important steps to build a data classification policy and automate enforcement.
Encryption Key Management in Microsoft 365
Learn how to improve encryption and key management processes in collaboration tools including the Microsoft 365 suite.
What is FIPS 140-2?
Understanding NIST’s FIPS 140-2 security requirements for cryptographic modules including encryption software.
Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands
CUI, which is maintained in government and contractor systems, is often a target and a cyber risk for the DOD, but the process of labeling and classifying CUI can be a complex endeavor. Learn how to tag, mark and protect it.
NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards
We are excited to share that archTIS' NC Protect product has been named 2022 Policy Management Solution of the Year in the 6th annual Cybersecurity Breakthrough Awards.
How to Optimize Governance and Data Security in Microsoft 365
Discover how dynamic data security that enforces governance more effectively secures collaboration in M365 and Teams without impacting productivity.
Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server
Introducing Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server for NC Protect Users.
As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep
In this ITWeb interview, archTIS Governance & Compliance expert Dave Matthews discusses the topic of ABAC vs RBAC: How to create more efficient data security and avoid permission creep.
US DoD’s Adoption of Zero Trust Heats Up
Understanding how Attribute-Based Access Control (ABAC) extends the zero trust security model to the data level to improve the security of classified and sensitive information.
When Should You be Using Encryption?
To Encrypt or Not to Encrypt? Read our tips on when to use encryption and other steps you can take to protect sensitive data.
Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR
The new export control material capability in Kojensi SaaS v2.0 assists supply chain organisations with the management of U.S. International Traffic in Arms Regulations (ITAR) regulated information, including Controlled Unclassified Information (CUI).
Singapore’s PDPA Penalties Set to Increase Starting Oct 1
What you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.
Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises
Explore 5 practical use cases for discovering and protecting sensitive data in M365 and SharePoint on-premises with NC Protect.
Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High
DoD controlled unclassified information (CUI) visual marking requirements and how to implement them in M365, Office 365 and GCC High.
Tips for Managing Unstructured Data Security
Explore the unstructured data security and protection controls needed to ensure only the right users have access to the right content at the right time.
Managing the Scramble for Meeting ITAR Compliance
Selling to the Department of Defence or dealing with Export Controlled material? Discover how to manage the information security and compliance of ITAR and other regulated data
Managing Microsoft 365 Guest Access
Discover how to easily and effectively secure and audit Guest access across your Microsoft 365 applications.
DFARS Compliance in Microsoft 365
Understanding DFARS compliance requirements for CUI stored, collaborated on and shared in Microsoft 365 Applications.