archTIS In The News

What a zero-trust blueprint might look like for multi-national coalitions

What a zero-trust blueprint might look like for multi-national coalitions

The U.S., NATO and other allies need to lean into security frameworks such as zero-trust if they hope to hold an advantage over emerging adversaries.
How treating important data like a military secret can improve overall data security

How treating important data like a military secret can improve overall data security

Earlier this month, Australian data security company archTIS published a fascinating blog post on how to keep intellectual property and military secrets secure, especially from insiders with malicious intent. Read Now.
Moving from hackers to insider threats and access

Moving from hackers to insider threats and access

The end of 2022 has seen everyday Australians feel the impact of poor cybersecurity policy and implementation. The way we think about cybersecurity needs to change, according to archTIS COO Kurt Mueffelmann.
SPOTLIGHT: Protecting sensitive information in the defence environment, with Daniel Lai

SPOTLIGHT: Protecting sensitive information in the defence environment, with Daniel Lai

In this episode of the Defence Connect Spotlight podcast, chief executive officer and managing director of archTIS Daniel Lai joins host Liam Garman to discuss securing sensitive information amid growing cyber insecurity.
Cybersecurity Connect Podcast: Top tips to keep your businesses’ information secure, with archTIS’ Matthew Kluken

Cybersecurity Connect Podcast: Top tips to keep your businesses’ information secure, with archTIS’ Matthew Kluken

In this episode of the Cyber Security Uncut podcast, archTIS' Matthew Kluken,joins host Liam Garman to discuss the importance of data-centric security frameworks to protect organisational and business information.
Lock down your data from raids

Lock down your data from raids

Productivity is the answer to inflation

Productivity is the answer to inflation

Controlling the ITAR Compliance Scramble

Controlling the ITAR Compliance Scramble

Understanding the Benefits of Attribute-Based Access Control (ABAC)

Understanding the Benefits of Attribute-Based Access Control (ABAC)

Optus breach: Labor pledge to update laws covering security

Optus breach: Labor pledge to update laws covering security

10-Year Cyber Strategy to be Recast by Labor

10-Year Cyber Strategy to be Recast by Labor

How can you create data-centric zero trust?

How can you create data-centric zero trust?

How can you simultaneously enhance and secure Microsoft Teams?

How can you simultaneously enhance and secure Microsoft Teams?

Facebook’s Whistleblower is a Case Study in Information Security

Facebook’s Whistleblower is a Case Study in Information Security

How Shared Infrastructure Collaboration Will Boost Defence Productivity

How Shared Infrastructure Collaboration Will Boost Defence Productivity

Stop swiveling: Modernize security and info sharing with multilevel security

Stop swiveling: Modernize security and info sharing with multilevel security

Protecting Data-Centric Information the archTIS Way

Protecting Data-Centric Information the archTIS Way

PODCAST: Navigating The Cyber Security Market – With Daniel Lai, Founder and CEO of archTIS

PODCAST: Navigating The Cyber Security Market – With Daniel Lai, Founder and CEO of archTIS

Defending your organisation against insider threats

Defending your organisation against insider threats

archTIS and Microsoft: Zero Trust information security for Microsoft Teams

archTIS and Microsoft: Zero Trust information security for Microsoft Teams