Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Zero Trust Data Format (ZTDF)?

Historically, secure communication across allied nations has been hindered by disparate standards and manual tagging processes. The challenge: each nation and its respective defense agencies have their own data classification and security standards and protocols, making interoperability between allies a constant struggle.

Australia's 2025 Protective Security Policy Framework (PSPF) Now Mandates Zero Trust - What You Need to Know and Do

Australia’s updated Protective Security Policy Framework (PSPF) now mandates the adoption of Zero Trust principles. Australia’s Protective Security Policy Framework (PSPF) Annual Release 2025 now formally mandates the adoption of zero trust principles to improve cybersecurity posture. Government organisations must now align their cybersecurity strategies with the Information Security Manual and the Guiding Principles to Embed a Zero Trust Culture.

BYOK vs HYOK: What's the Difference and Which Approach Is Right for You?

As organizations move to the cloud, ensuring robust data security and privacy controls has become a top priority. Encryption is crucial for any organization’s cloud security and data sovereignty strategy; however, who controls the encryption keys can significantly affect the effectiveness of these measures.

The Data Sovereignty Debate Heats Up

The debate over data sovereignty spurred by the U.S. CLOUD Act is intensifying. On June 10, 2025, France’s Senate held a hearing on the role of procurement in data sovereignty, where Anton Carniaux, Director of Public and Legal Affairs at Microsoft France, testified. He stated he could not guarantee that data from French citizens would not be shared with U.S. authorities without explicit authorization from French authorities.

Classifying and Protecting Sensitive Data in M365 and SharePoint On-Premises

With the abundance of compliance requirements that organizations must comply with, such as HIPAA, PCI and GDPR to name a few, there is an increasing need for organizations to properly classify sensitive data and safeguard it accordingly. Identifying and classifying sensitive data is a crucial initial step in an organization’s compliance journey.

Data Loss Prevention Guide for Microsoft 365 and SharePoint

Organizations today face an unprecedented challenge: their most valuable assets can disappear in a matter of milliseconds through accidental sharing, malicious theft, or simple human error. Data Loss Prevention is a strategic approach to safeguarding information before it crosses organizational boundaries, acting as both a guardian and a gatekeeper for critical business assets.

Transforming Defence Information Sharing & Collaboration with Zero Trust Solutions

Partners in the defence supply chain, including manufacturers, distributors, and service providers, play a critical role in supporting national security initiatives. These entities frequently handle sensitive and classified information, which necessitates a robust framework of cybersecurity measures. To safeguard this sensitive data from potential breaches and cyber threats, they are required to adhere to stringent government-mandated cybersecurity protocols.

What is Multi-Level Security (MLS) and why is it important?

Implementing the right separation and information protection needed to meet defense and national security requirements is often challenging. As government and defense organisations continue to face increasingly sophisticated threats, cybersecurity must evolve to incorporate new technologies and methodologies where applicable. Dynamic Multi-Level Security (MLS) offers a solution.

Understanding the U.S. Cloud Act: Impact on Compliance, Agreement, and Data Protection

The complex nature of the U.S. CLOUD Act (CLOUD Act) presents far-reaching implications for global data governance. In this article, we explore how this pivotal legislation is reshaping compliance requirements, transforming privacy frameworks and challenging traditional concepts of data sovereignty, as well as strategies and technologies to ensure compliance.

What is FIPS 140-3?

Encryption has become a vital data protection tool used by global governments, defense and enterprises. However, not all solutions use the same cipher techniques. Several encryption algorithms can be used to secure data with varying levels of security. To establish acceptable standards for encryption technologies utilized by the U.S. Government, the National Institute of Standards and Technology (NIST) published the Federal Information Processing Standards (FIPS) FIPS-140.