Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2023

"Flying Under the Radar:" How to Protect Your Organization's Reputation

Over 72 percent of Indian citizens think their personal data has been compromised, according to a recent article in Business Today. They blame a variety of organizations and institutions, which is understandable. Now imagine your organization is the one to blame. Could your company survive this type of hit to its reputation? Would it be able to retain customers who no longer trust you to keep their sensitive information secure?

Data Sovereignty Best Practices in M365

The volume of data moving to and collaborating in the cloud has spurred government concern and oversight over protecting sensitive personal, business, government and defence data. Data sovereignty is the concept of a country or jurisdiction having the right to govern and control digital data collection, storage, processing, and distribution within its borders. Organisations operating across international borders must comply with the rules of each country/jurisdiction where their data resides.

Avoid Dangerous Cloud Migration Mistakes with these 4 Tips

Unstructured data is the efficiency elephant in the room for most businesses. In fact, 95% of businesses need to manage unstructured data. Until you get a hold of the systems and process behind your data, your business is operating in the dark. A well-organized cloud environment can put your data and your business on a clear, secure footing. But, you’ll have to migrate that data from point A to point B.

archTIS Shortlisted for Two 2023 Australian Defence Industry Awards

We are proud to share that archTIS has been shortlisted for two 2023 Australian Defence Industry Awards. The company has been named a Finalist for Cyber Business of the Year, and Managing Director and CEO Daniel Lai is nominated for Executive of the Year. archTIS is humbled to be recognised once again for our contributions as a company to improving the secure collaboration of sensitive information in the defence industry. I am also honoured to be nominated for Executive of the Year.

New DLP Tools, Location Insights, Track Network Drives, and More! (v9.0) | CurrentWare

CurrentWare version 9.0 is here! This update introduces transparent packet filtering technology, allowing for significant enhancements to the tracking and restriction capabilities of the CurrentWare Suite. By upgrading to CurrentWare v9.0 you will have greater protection against the data security risks of cloud storage services, potentially malicious file downloads, network share drives, and more!

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

Kojensi from archTIS is a highly secure, multi-level security platform for the secure sharing and collaboration of sensitive and classified files. By taking a data-centric, zero trust security approach, a file’s attributes such as security classification, organisation and country releasability, determine who is able to access, edit and download the file. Kojensi users can create, co-author and share documents in real-time, all in a secure and intuitive platform that ensure sensitive information remains need to know only.

NC Protect: Advanced Data Protection for Govt, Defense & Supply Chain in Microsoft 365 Applications

Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.

What is Attribute Based Access Control or ABAC?

The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.

Improve Content Accessibility and Control Sprawl with Egnyte's File and Folder Shortcuts

Given the growth of hybrid work models, organizations are becoming increasingly decentralized. Employees operating from diverse locations access business information through various cloud tools and digital devices.

Improve the Use of Your Data with End-to-End Data Protection Solutions | Protegrity Data Protection

Welcome to the new age of data usage. Start utilizing your data to its full potential while maintaining compliance and end-to-end protection. More from Protegrity: For over 15 years, Protegrity has set the standard in precision data protection, helping enterprises secure and use a perpetually growing store of sensitive data. Through granular protection and intelligent role-based empowerment, Protegrity helps companies focus on growth, development, and optimization.

Consent Phishing Mystery

Janice was notified of an unauthorized $10,000 transfer from her account. Which of her co-workers is behind this nefarious attack? And how did they gain access to her personal data? Find out in this silent mystery. Learn more about Security Awareness and how it can prepare your employees to recognize and neutralize social engineering attacks and human error.

Do You Use ChatGPT at Work? These are the 4 Kinds of Hacks You Need to Know About.

From ChatGPT to DALL-E to Grammarly, there are countless ways to leverage generative AI (GenAI) to simplify everyday life. Whether you’re looking to cut down on busywork, create stunning visual content, or compose impeccable emails, GenAI’s got you covered—however, it’s vital to keep a close eye on your sensitive data at all times.

Overcoming US Regulatory Compliance Challenges with Borderless Data

In today’s age of rapidly increasing data collection, data privacy laws are becoming more prevalent than ever. The EU’s General Data Protection Regulation (GDPR) is considered the worldwide benchmark of data privacy law. While many countries have followed similar regulations, the United States does not have a GDPR equivalent. Instead of national standards and regulations, individual states pass their own privacy laws.

Moody's Analytics Uses Protegrity Pseudonymization to Protect CID Data

The data protection landscape is changing. The rapid adoption of cloud and software as a service (SaaS) greatly affects the financial industry, where many institutions rely on SaaS vendors for data protection previously implemented in-house. Moody’s Analytics relies on cloud service providers (CSPs) to adequately protect its data, showcasing the need for scalability, industry cost controls, and flexibility.

GhostSec's Revelation of Iranian Surveillance Software

GhostSec has reported a successful breach of the FANAP Behnama software, which they describe as the “Iran regime’s very own Privacy-invading software”. This breach has resulted in the exposure of approximately 20GB of compromised software. The group alleges that the Iranian government employs the software for citizen surveillance, representing a significant advancement in the nation’s surveillance capabilities.

Data Loss Prevention (DLP) Systems: Types, Key Features, Pros and Cons

As the number and severity of cybersecurity attacks rise each year, organizations are compelled to look for measures to protect sensitive data. The abundance of cybersecurity solutions on the market may create confusion and pressure, as choosing the wrong one may lead to security gaps. Many companies turn to data loss prevention (DLP) systems, since they have been on the market for years. But is a DLP system enough to protect your data?

GenAI is Everywhere. Now is the Time to Build a Strong Culture of Security.

Since Nightfall’s inception in 2018, we’ve made it our mission to equip companies with the tools that they need to encourage safe employee innovation. Today, we’re happy to announce that we’ve expanded Nightfall’s capabilities to protect sensitive data across generative AI (GenAI) tools and the cloud. Our latest product suite, Nightfall for GenAI, consists of three products: Nightfall for ChatGPT, Nightfall for SaaS, and Nightfall for LLMs.

Worried About Leaking Data to LLMs? Here's How Nightfall Can Help.

Since the widespread launch of GPT-3.5 in November of last year, we’ve seen a meteoric rise in generative AI (GenAI) tools, along with an onslaught of security concerns from both countries and companies around the globe. Tech leaders like Apple have warned employees against using ChatGPT and GitHub Copilot, while other major players like Samsung have even go so far as to completely ban GenAI tools. Why are companies taking such drastic measures to prevent data leaks to LLMs, you may ask?

What Is Global Privacy Control (GPC), and how can it help you protect your data?

More than 67% of internet users in the US remain blissfully unaware of online privacy and data protection regulations. At the same time, the global average cost of data breaches and cyber-attacks has increased by 15% since 2020 to $4.45 million. In fact, compromised credentials and personal information are responsible for nearly 20% of nearly 1.4 billion security incidents during this period.

ChatGPT DLP (Data Loss Prevention) - Nightfall DLP for Generative AI

**ChatGPT Data Leak Prevention (DLP) by Nightfall AI: Prevent Data Leaks and Protect Privacy** ChatGPT is a powerful AI utility that can be used for a variety of tasks, such as generating text, translating languages, and writing different kinds of creative content. However, it is important to use ChatGPT safely and securely to prevent data leaks, protect privacy, and reduce risk.

Top 15 Data Security Posture Management (DSPM) platforms for 2023

Data Security Posture Management (DSPM) plays a critical role in identifying security risks, prioritizing misconfigurations, and implementing a zero-trust framework. It is an emerging technology, and there are only a few capable solutions that provide good product offerings. Check out the list of some of the best DSPM platforms that can be considered to streamline data protection, governance, and compliance efforts.

Level Up Your Incident Response Playbook with These 5 Tips

Data breaches loom large for organizations big and small. On top of being incredibly time-consuming, they can lead to legal damages, shattered customer trust, and severe financial fallout—and that’s just the tip of the iceberg. ‍ ‍ Laws and technologies are constantly evolving, which means that, in turn, security strategies must always adapt to keep up.