What is the Attribute Based Access Control (ABAC) model? Learn about ABAC, the security model underpinning archTIS’ products and services, and how it can be applied to your data security needs. The secure collaboration challenge Globally, digital transformation...
Better protect your sensitive information—wherever it lives and travels Azure Information Protection (AIP), as part of the Microsoft Information Protection set of solutions, works with other Microsoft and 3rd-party services to enable you to discover, classify and...
Today at Microsoft Inspire in Las Vegas we announced that NC Protect now utilizes Microsoft Information Protection (MIP) labels to enhance conditional access and data security controls in Microsoft platforms to guard against insider threats, sensitive data misuse,...
The recent US National Guard leak has once again focused attention on the risk that overprivileged access poses. A massive intelligence breach occurred when Massachusetts US National Guardsman Jack Teixeira, an IT specialist with a top secret security clearance,...
Defense contractors and suppliers have anxiously been awaiting news on the roll-out date for CMMC 2.0. The DoD previously indicated it would publish a final or interim final rule in 2023 to formally implement the CMMC program and contractor compliance with its...