What is Zero Trust Access and How to Employ It

What is Zero Trust Access and How to Employ It

The world has changed and along with it the strategic role of information security Now more than ever, the Boardroom, Chief Executive Officer and Chief Information Officer have Information Security front of mind and keeping them awake. Every day a new attack, incident...
The Top Insider Data Loss Causes and Preventions

The Top Insider Data Loss Causes and Preventions

Companies are reporting sharp increases in data loss spurred by remote and hybrid work. How is this occurring with all the security measures and tools enterprises have in place? Insider privilege abuse and data mishandling are cited in multiple reports as growing...
Notice regarding the recent Log4j vulnerability

Notice regarding the recent Log4j vulnerability

As a matter of critical priority, archTIS has undergone technical analysis of this vulnerability and any impacts that it may have on the archTIS suite of products. After a full investigation, the response team have confirmed that the NC Protect, cp.Protect and...