Insights from Theodosiana

Explore our latest insights, research, and product updates on securing the future of data.

handcuffs

Google Indictment: When Access Becomes the Weapon

map illustration

Mastering Compliance: A Practical Guide to Data-Centric Security

byzantine

ISO 27001 vs. NIST Framework: How Encryption Policies Differ and What It Means for You

A digital illustration of the Theodosiana Walls of Constantinople, showing a massive stone and brick fortification with defensive towers and a water-filled moat at sunset.

What the Last Great Empire Teaches Us About Data-Centric Security

data management

Best Practices for Compliance Data Management Across Departments

downward graph of city buildings

How Compliance Impacts Your Bottom Line

byzantine architecture

How ISO 27001 Certification Strengthens Your Security Posture

theodosiana walls

The Role of Automation in Compliance Management

castle in forest

How to Handle Compliance Challenges During Business Expansion

sinkhole

Your Compliance Failed, Now What?

magnifying glass at computer

What Assessors Actually Look for During Security Assessments

roman keys

The Problem With Encryption That Relies on Master Keys

castle illustration

Overlooked Compliance Gaps That Cost Companies

open door showing masked man

When Valid Access Becomes a Data Threat

Top 6 Risks of Non-Compliance with ITAR, EAR, and CMMC

Top 6 Risks of Non-Compliance with ITAR, EAR, and CMMC

sun rising illustration

Why ITAR & CMMC Compliance Fails Before Your Assessment Even Begins

orange car in ci

Detection-First Security Trains Attackers to Move Faster

army with tank

How to Implement DCC Compliance Across Your Supply Chain

guards outside castle

Your Files Are Encrypted. So Why Are They Still at Risk?

caution sign

How to Protect Your Data Against Third-Party Breaches

encrypted door

How to Choose the Right Encryption Solution for Your Industry

hospital beds in hospital room

Pass Your NHS DSP Toolkit Assessment: What IT Teams Need to Know

encryption illustration

ITAR Encryption Compliance Guide: How to Meet the ITAR Encryption Carve-Out

security-it-office

How to Secure Export-Controlled Data Without Disruption

home office

Encrypted File Sharing: Why Most Tools Fail to Secure Data When It’s Shared or Moved

network connections

The Role of Conditional Access in Next-Generation Encryption Tools

military plane

How to Build ITAR Compliance into Your Incident Response Playbook

international arms

How CISOs Can Make ITAR Compliance Scalable

cybersecurity office

How to Pass Cyber Essentials Plus on Your First Attempt

ai robot at laptop

Building Cyber Resilience in an Era of Agentic AI

military tanks

ITAR Compliance Readiness Checklist: What Your Tech Stack Must Be Able to Prove

ai robot

What the Claude Code Incident Means for the Future of Cybersecurity

hackers in a room with monitors

What APT31’s Latest Attack Means for Data Protection

digital supply chain

F5’s Supply Chain Breach: Why File-Level Security Matters More Than Ever

military tank and airplane

Defence Cyber Certification (DCC) Explained: Who Needs It and How to Get Started

people working on laptops in a cafe

What Remote and Hybrid Teams Need for ITAR Compliance

two men in acybersecurity office

How the Defence Cyber Certification (DCC) Impacts Your Cybersecurity Strategy

military machine

How to Choose a Compliance Solution That Meets ITAR and CMMC Standards

two men in a data security office

Integrating ITAR Compliance with SIEM, SOAR, and Other Security Tools

hacker

Why Are Data Breaches Still Happening, Even With So Many Security Tools?