View articles by tag/topic
Latest blog

Enhancing asset management with Enterprise Recon: A data-centric approach
Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks. Effective asset management…

The real cost of legacy data – Managing the ROT
As organizations are looking to modernize their technology estate, many remain burdened with legacy data, costing millions of dollars a year to host and maintain. The risks posed by legacy and redundant, obsolete and trivial (ROT) data present a very real threat in today’s progressive cybercrime landscape. In this post we’ll consider the hidden costs…

The value of data discovery for ISO27001
The international standard ISO27001 is one of the longest-standing and most widely recognized benchmarks for cybersecurity and privacy protection worldwide. Introduced initially as BS 7799 in 2995 and updated to ISO27001 in 2005, the standard establishes an information security management system (ISMS), delivering a comprehensive framework for organizational security and information risk management. The standard…

Mastering privacy compliance with PII discovery and data management
The number of data protection and privacy laws in place globally have increased dramatically over the last decade. According to the latest UNCTAD figures, 137 countries have enacted privacy laws protecting personal data rights of residents. Almost 80% of the world’s population is protected by privacy legislation – around 6.3 billion people. While historically, data…

Cybersecurity starts with data discovery: Strategies for a safer digital future
Organizations today must prioritize cybersecurity to protect themselves in the face of an ever increasing barrage of cyber-threats. Whether this comes from cybercriminals seeking data for sale or extortion or to cause disruption, or from internal sources including disgruntled staff members and trusted suppliers – data is the primary target. As organizations generate and store…

Business resilience for the data age: Why data discovery is the cornerstone
As cyber-attacks continue to significantly impact business operations, whether targeting the organization or their supply chain, amid a turbulent geopolitical climate, it’s clear that business resilience is now a crucial necessity for organizations of all sizes. According to a 2023 report from PwC, 96% of organizations had experienced business disruption in the previous two years.…

Understanding Data Management, Data Governance and DSPM
Today, organizations are powered by the data they collect, store, analyze and process. Data drives company decision-making, enhanced operations and clearer understanding of customers, market trends and company performance. Consumers too are driving this increased reliance on data. Delivering seamless customer experiences across all interactions is fundamentally built on the development of unique customer profiles,…

Ground Labs at AUSCERT 2025: Evolve and Thrive
Last month, Ground Labs was proud to sponsor the AUSCERT Cyber Security Conference 2025, hosted at The Star Gold Coast. This year’s theme, “Evolve and Thrive,” explored the adaptive strategies needed for organizations to survive in today’s cyber-threat landscape. In this post, we’ll share our session highlights and key takeaways from the event. Digital Survivors:…

World Password Day | Why secrets discovery is the first step to securing your organization
Have you ever counted how many times a day you access information by logging into a platform or system, or providing a password or keycode? In today’s digital world, passwords have become cemented in our personal and professional lives. The first Thursday of May is World Password Day, initiated in 2013 by Intel to raise…

Seven steps to effective data risk management
Data risk management is becoming increasingly important to businesses, as the vast amounts of data generated today present potential both for operational gain and organizational risk. Over the last decade, data has emerged as the lifeblood of innovation. Nevertheless, handling such vast quantities of data, much of which is personal or commercially sensitive, comes with…