Insights from Theodosian

Explore our latest insights, research, and product updates on securing the future of data.

roman keys

How to Build a Key Management Policy That Passes a CMMC Assessment

roman prison

The Ransomware Shift: Why Immutable Backups Can't Stop Data Extortion

data room

Virtual Data Room Security: What Actually Protects Sensitive Files During Due Diligence

roman bri

Per-File Encryption vs. Disk Encryption vs. DLP: Which One Actually Protects CUI When It Leaves Your Environment?

roman gates

The File Security Evidence Package: What CMMC, ITAR, and DoD Auditors Will Ask For

lock and ke

CMMC Level 2 Certification: How Long Does It Actually Take to Get File Security Controls Audit-Ready?

stack of wood

How to Complete Your Microsoft Security Stack With File-Level Encryption

encrypted door

Five Signs Your CMMC Encryption Controls Will Fail a C3PAO Assessment

laptop

How To Protect CUI on Contractor Devices: The Control Many CMMC Assessments Fail

roman-bricks

ITAR Compliant File Sharing: A Practical Guide for Defense Subcontractors

castle

Data Governance Doesn't End When the File Leaves: The Case for Persistent File-Level Governance

roman army

CMMC 2.0: What Defense Contractors Must Complete Before November 2026

sea border

What Is Data-Centric Security? (And Why Perimeter Security Keeps Breaking)

sunny day in ancient rome

File-Centric Zero Trust: Why Security Has to Live in the File, Not the Network

closed gates

How to Revoke Access to a File After It's Already Been Downloaded or Shared

alarm bell

What Happens to Your Files When Credentials Are Stolen?

roman clock

CMMC Level 2 Encryption Requirements: A Plain-Language Guide for Defense Contractors

roman building rubble

Why Perimeter-Only Security Has a Structural Blind Spot

exports

How to Survive a BIS Audit: Building Your EAR Compliance Evidence Package

roman army

FTC Safeguards Rule: Why Encryption at Rest Doesn't Cover the Data You've Already Shared