Announcing the Launch of a New and Improved archTIS.com
We are pleased to announce that we have launched a new and improved website and logo. Explore the site's new features.
What is Attribute-Based Access Control or ABAC?
Learn about ABAC, the security model underpinning our solutions, and how it can be applied to secure collaboration of sensitive data.
The Top Remote Work Security Threats Uncovered in New Report
Benchmark your efforts to secure the new remote workforce and discover key challenges and unique security threats in the 2021 State of Remote Work Security report.
Human Error a Top Source of Australian Data Breaches in 2020
Explore the key findings from the Office of the Australian Information Commissioner (OAIC) bi-annual Notifiable Data Breaches Report: July–December 2020.
Women in Tech Play Leading Roles at archTIS
In honor of International Women’s Day we asked the amazingly talented women on the archTIS team about being a woman in tech.
Meet US Federal and Defense Director Bill Kalogeros
Hear what our new Director of US Federal and Defense had to say about the security challenges facing the space today.
Rethinking trust for sensitive information collaboration and protection
To protect sensitive and classified data effectively, we must re-think the traditional models of information protection and trust, and instead look to modern security paradigms such as attribute-based access control (ABAC).
Introducing Simplified Information Security and Guest Access Control for Microsoft Teams Owners
NC Protect now empowers team owners to apply security and access policies to teams and channels, reducing ...
10 Questions to Assess Microsoft Teams Information Security Needs
Discover if out of the box or third party information security is right for your data protection needs in Microsoft Teams.
NC Protect Secures 7 Nominations in the 2021 Cybersecurity Excellence Awards
Learn more about the categories we're nominated in and how to cast your vote
Protecting Data in the Event of Breach with Zero Trust
There are ways protect your data in the event of breach. Now is the time to apply a Zero Trust approach to your data access.
How to conduct a GDPR compliance audit
The purpose of undergoing a GDPR compliance audit is to determine if a company that deals with data has put in place adequate policies and measures that would regulate how personal data are being processed. Learn more about the benefits of GDPR compliance audit in our blog post.
A Message from archTIS’s CEO on the Acquisition of Nucleus Cyber
Discover what this exciting merger means for our customer, prospects and partners.
archTIS Closes Merger with Nucleus Cyber to Accelerate Growth in 2021
Nucleus Cyber was acquired by archTIS (ASX:AR9), an Australian software provider specializing in secure information sharing and collaboration.
3 Access and Security Plays to Mitigate the Damage of a Solar Winds Style Cyberattack
We’ve assembled some access and security tips to better protect your organization and the primary target - your data - from a cyberattack.
Join Nucleus Cyber’s Growing Global Channel Program
The Nucleus Cyber channel program ecosystem now includes over 25 partners around so customers can get local support for NC Protect anywhere. Learn more about the program.
Collaboration Tools Have Powered 2020: 6 Tips to Keep Them Secure
Collaboration tools have powered work and life in 2020 – Here’s 6 tips to keep them secure without slowing down collaboration.
3 Challenges of Managing SharePoint Access and Security
Discover a new model for managing SharePoint access and security that enables collaboration without compromising security.