archTIS
  • Products
    • Kojensi
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365
      • NC Protect for SharePoint On-premises
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect for NetApp ONTAP
      • Data Connector for Microsoft Sentinel
      • NC Protect for Government & Defense
      • NC Protect Integrations
    • NC Encrypt
    • Trusted Data Integration
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/Export Controls
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Data Encryption
      • Document Redaction
      • Email Encryption
      • File Integrity
      • Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Multi-label Classification for M365
      • Privacy Compliance
      • Restrict File Access
      • Secure Watermarks
  • Resources
    • Blog
    • Events
    • Resource Center
    • What is ABAC?
  • Support & Services
    • Support
    • Services
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Newsroom
      • Press Releases
      • Media Coverage
    • Partners
  • Investors
  • Contact
Select Page
Insider Threats Will Continue to Plague Organizations in 2020

Insider Threats Will Continue to Plague Organizations in 2020

by Irena Mroz | Jan 2, 2020 | Blog

2019 was the year of the Insider Threat – and they are sure to continue to compromise organizations in 2020. The Cybersecurity Insiders 2019 Insider Threat Report revealed that 70% of organizations surveyed reported they saw in increase in see insider attacks in...
As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information

As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information

by Irena Mroz | Nov 13, 2019 | Blog

This post by Nucleus Cyber’s Steven Marsh originally appear in Dark Reading  Pull a Van Helsing on those sucking the lifeblood from your data and intellectual property. Vampires do exist — in the workplace, that is. They bleed your company of customer data,...
When Pillow Talk Risks National Security – Preventing Malicious Insider Threats

When Pillow Talk Risks National Security – Preventing Malicious Insider Threats

by Irena Mroz | Oct 24, 2019 | Blog

It’s a familiar tale. Boy meets girl. Boy tries to impress girl with secrets from his government job. Boy steals confidential files from his job as a counterintelligence analyst at the Defense Intelligence Agency (DIA) to give to his journalist girlfriend to boost her...
Meet Two More Insiders Putting Your Data Security at Risk

Meet Two More Insiders Putting Your Data Security at Risk

by Irena Mroz | Apr 4, 2019 | Blog

Identifying the Top Insider Threats to Data Security Last week we unveiled one of the characters in our new Infographic, The Anonymous Admin. This week we look at 2 other insiders from the Infographic found in every organization who are inadvertently (and some...
Meet Two More Insiders Putting Your Data Security at Risk

Identifying The Top Insider Threats to Data Security: The Anonymous Admin

by Irena Mroz | Mar 27, 2019 | Blog

Identifying The Top Insider Threats to Data Security The best thing and worst thing about collaboration tools is you can put anything in them and share it. They present a multitude of ways to collaborate, but without the proper data-centric security controls also open...

Subscribe Now

Latest Blogs

  • Safeguarding Classified Information: How to Prevent Insider Data Breaches
  • How to Identify and Protect Personal Information
  • What is Sensitive Data? Sensitive Data Definitions, Types & Examples
  • Understanding the Proposed FAR CUI Rule

Latest Press Releases

  • archTIS Completes Asset Acquisition of Direktiv to Expand Market Innovation Across Data-centric Zero Trust Product Lines
  • archTIS Achieves JOSCAR-AU Registration to Streamline Defence and Aerospace Procurement Processes
  • Introducing the archTIS Trusted Data Integration Solution for Sensitive and Classified Structured Data
  • archTIS has been shortlisted for the 2024 Australian Cyber Security Awards and the Australian Defence Industry Awards
  • Follow
  • Follow
  • Follow
  • Follow

© 2025 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Services
  • Support

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • Media Coverage
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Contact

Contact Us

Investor Relations