A pile of alert signs representing ToolShell: A wake-up call for SharePoint data management

ToolShell: A wake-up call for SharePoint data management

This week, Microsoft confirmed that Chinese APT groups – including Linen Typhoon, Violet Typhoon and Storm-2603 – have been actively exploiting vulnerabilities in on-premises SharePoint servers. These vulnerabilities have been chained in an attack named “ToolShell.” ToolShell is being used by threat actors to gain initial access to target organizations. Initial access attacks are the…

Diagram of connected systems representing a data-centric approach to asset management with Enterprise Recon

Enhancing asset management with Enterprise Recon: A data-centric approach

Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks.  Effective asset management…

The real cost of legacy data – Managing the ROT

As organizations are looking to modernize their technology estate, many remain burdened with legacy data, costing millions of dollars a year to host and maintain. The risks posed by legacy and redundant, obsolete and trivial (ROT) data present a very real threat in today’s progressive cybercrime landscape. In this post we’ll consider the hidden costs…

A security shield on a network concept background representing data discovery for ISO27001 compliance

The value of data discovery for ISO27001

The international standard ISO27001 is one of the longest-standing and most widely recognized benchmarks for cybersecurity and privacy protection worldwide. Introduced initially as BS 7799 in 2995 and updated to ISO27001 in 2005, the standard establishes an information security management system (ISMS), delivering a comprehensive framework for organizational security and information risk management.  The standard…

a globe surrounded by model people of all races on a green background representing privacy law compliance

Mastering privacy compliance with PII discovery and data management

The number of data protection and privacy laws in place globally have increased dramatically over the last decade. According to the latest UNCTAD figures, 137 countries have enacted privacy laws protecting personal data rights of residents. Almost 80% of the world’s population is protected by privacy legislation – around 6.3 billion people.  While historically, data…

a padlock is displayed on a background of purple blocks representing cybersecurity starts with data discovery for a safer digital future

Cybersecurity starts with data discovery: Strategies for a safer digital future

Organizations today must prioritize cybersecurity to protect themselves in the face of an ever increasing barrage of cyber-threats. Whether this comes from cybercriminals seeking data for sale or extortion or to cause disruption, or from internal sources including disgruntled staff members and trusted suppliers – data is the primary target.  As organizations generate and store…

chess pieces representing business resilience

Business resilience for the data age: Why data discovery is the cornerstone

As cyber-attacks continue to significantly impact business operations, whether targeting the organization or their supply chain, amid a turbulent geopolitical climate, it’s clear that business resilience is now a crucial necessity for organizations of all sizes. According to a 2023 report from PwC, 96% of organizations had experienced business disruption in the previous two years.…

Blue shield with a lock representing understanding data management, data governance and DSPM

Understanding Data Management, Data Governance and DSPM

Today, organizations are powered by the data they collect, store, analyze and process. Data drives company decision-making, enhanced operations and clearer understanding of customers, market trends and company performance. Consumers too are driving this increased reliance on data. Delivering seamless customer experiences across all interactions is fundamentally built on the development of unique customer profiles,…

AUSCERT Cyber Security Conference 2025

Ground Labs at AUSCERT 2025: Evolve and Thrive

Last month, Ground Labs was proud to sponsor the AUSCERT Cyber Security Conference 2025, hosted at The Star Gold Coast. This year’s theme, “Evolve and Thrive,” explored the adaptive strategies needed for organizations to survive in today’s cyber-threat landscape. In this post, we’ll share our session highlights and key takeaways from the event. Digital Survivors:…

data discovery for effective secrets management

World Password Day | Why secrets discovery is the first step to securing your organization

Have you ever counted how many times a day you access information by logging into a platform or system, or providing a password or keycode? In today’s digital world, passwords have become cemented in our personal and professional lives. The first Thursday of May is World Password Day, initiated in 2013 by Intel to raise…


Get our newsletters, as well as updates on the latest Ground Labs’ product features and insights on data discovery.