Blog

Stay up to date on industry trends, security advice, product news and more.

4 Steps for Defining Data Classification Levels and Policies

4 Steps for Defining Data Classification Levels and Policies

Data classification is an important business process. Learn 4 important steps to build a data classification policy and automate enforcement.
Encryption Key Management in Microsoft 365

Encryption Key Management in Microsoft 365

Learn how to improve encryption and key management processes in collaboration tools including the Microsoft 365 suite.
What is FIPS 140-2?

What is FIPS 140-2?

Understanding NIST’s FIPS 140-2 security requirements for cryptographic modules including encryption software.
Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

CUI, which is maintained in government and contractor systems, is often a target and a cyber risk for the DOD, but the process of labeling and classifying CUI can be a complex endeavor. Learn how to tag, mark and protect it.
NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

We are excited to share that archTIS' NC Protect product has been named 2022 Policy Management Solution of the Year in the 6th annual Cybersecurity Breakthrough Awards.
How to Optimize Governance and Data Security in Microsoft 365

How to Optimize Governance and Data Security in Microsoft 365

Discover how dynamic data security that enforces governance more effectively secures collaboration in M365 and Teams without impacting productivity.
Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server

Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server

Introducing Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server for NC Protect Users.
As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep

As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep

In this ITWeb interview, archTIS Governance & Compliance expert Dave Matthews discusses the topic of ABAC vs RBAC: How to create more efficient data security and avoid permission creep. 
US DoD’s Adoption of Zero Trust Heats Up

US DoD’s Adoption of Zero Trust Heats Up

Understanding how Attribute-Based Access Control (ABAC) extends the zero trust security model to the data level to improve the security of classified and sensitive information.
When Should You be Using Encryption?

When Should You be Using Encryption?

To Encrypt or Not to Encrypt? Read our tips on when to use encryption and other steps you can take to protect sensitive data.
Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR

Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR

The new export control material capability in Kojensi SaaS v2.0 assists supply chain organisations with the management of U.S. International Traffic in Arms Regulations (ITAR) regulated information, including Controlled Unclassified Information (CUI).
Singapore’s PDPA Penalties Set to Increase Starting Oct 1

Singapore’s PDPA Penalties Set to Increase Starting Oct 1

What you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.
Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

Explore 5 practical use cases for discovering and protecting sensitive data in M365 and SharePoint on-premises with NC Protect.
Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

DoD controlled unclassified information (CUI) visual marking requirements and how to implement them in M365, Office 365 and GCC High.
Tips for Managing Unstructured Data Security

Tips for Managing Unstructured Data Security

Explore the unstructured data security and protection controls needed to ensure only the right users have access to the right content at the right time.
Managing the Scramble for Meeting ITAR Compliance

Managing the Scramble for Meeting ITAR Compliance

Selling to the Department of Defence or dealing with Export Controlled material? Discover how to manage the information security and compliance of ITAR and other regulated data
Managing Microsoft 365 Guest Access

Managing Microsoft 365 Guest Access

Discover how to easily and effectively secure and audit Guest access across your Microsoft 365 applications.
DFARS Compliance in Microsoft 365

DFARS Compliance in Microsoft 365

Understanding DFARS compliance requirements for CUI stored, collaborated on and shared in Microsoft 365 Applications.