A pile of alert signs representing ToolShell: A wake-up call for SharePoint data management

ToolShell: A wake-up call for SharePoint data management

This week, Microsoft confirmed that Chinese APT groups – including Linen Typhoon, Violet Typhoon and Storm-2603 – have been actively exploiting vulnerabilities in on-premises SharePoint servers. These vulnerabilities have been chained in an attack named “ToolShell.” ToolShell is being used by threat actors to gain initial access to target organizations. Initial access attacks are the…

Diagram of connected systems representing a data-centric approach to asset management with Enterprise Recon

Enhancing asset management with Enterprise Recon: A data-centric approach

Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks.  Effective asset management…

data discovery for effective secrets management

World Password Day | Why secrets discovery is the first step to securing your organization

Have you ever counted how many times a day you access information by logging into a platform or system, or providing a password or keycode? In today’s digital world, passwords have become cemented in our personal and professional lives. The first Thursday of May is World Password Day, initiated in 2013 by Intel to raise…

2025 sphere representing future trends in data management for 2025 and beyond

The evolution of data management: Key trends for 2025 and beyond

As we head into a new year, organizations face increasing pressures to manage their data effectively and responsibly while delivering rapid innovation, in a technology landscape undergoing seismic change driven by AI and cloud computing. In 2025, we predict that several key trends will drastically influence the data management sector, driven by global legislation, security…

Introducing Enterprise Recon Cloud. Ground Labs' award-winning data discovery solution is now available on AWS Marketplace

Introducing Enterprise Recon Cloud: Available now on AWS Marketplace

Enterprise Recon Cloud is now available via AWS Marketplace. Enterprise Recon Cloud offers the award-winning data discovery and data management capabilities of Enterprise Recon, packaged for cloud-first organizations. It offers a new way for customers to leverage the power of Enterprise Recon without the need for additional hardware procurement or complex installation process. What is…

EU flag on a blue piggy bank against a blue background, representing mastering DORA: ensuring operational resilience with data discovery

Mastering DORA: Ensuring operational resilience with data discovery

In today’s rapidly evolving financial landscape, ensuring operational resilience has become more critical than ever. The EU Digital Operational Resilience Act (DORA) is a landmark regulation designed to bolster the stability and security of financial entities across Europe. The regulation, introduced in January 2023 and enforceable from January 2025, seeks to protect the financial sector…

Two business people are sitting having a conversation against a backdrop of an office block skyline representing data discovery for consultants

The cybersecurity consultant's guide to data discovery

In the complex world of digital security, cybersecurity consultants are essential navigators, helping organizations navigate ever-evolving cyber-threats. Their expertise is crucial in a landscape where digital risks are an everyday reality, and effective defense strategies can make the difference between safety and data breach. Central to the consultant’s toolkit are data discovery tools. These tools…

A doctor stands holding a stethoscope against a hospital corridor background representing data discovery and electronic personal health information for healthcare providers

Protecting electronic personal health information: The role of data discovery in modern healthcare

Healthcare providers are entrusted with the most intimate details of a person’s life, in the form of their medical records and electronic personal health information (ePHI). With this trust comes the immense responsibility of protecting that data from the ever-growing threat of cyberattacks, data breaches and ransomware. The sector is among the most targeted by…

a magnifying glass against a green background representing the evolution of data discovery

The evolution of data discovery — from statistics to data security

In this article, we’ll explore the mainstream approaches organizations use to search for sensitive data across systems and networks. We’ll take a brief step back in time to understand the origins of data discovery that underpin the approaches and techniques used today. As well as explaining several of the real-world discovery methods businesses deploy, we’ll…

regex written to replicate the search syntax, read as: /(reg)ex/

A closer look at script discovery using regex

The origins of regular expressions, or regex, can be traced back to the 1950s when they were formalized in mathematical notation for “regular events” by Stephen Cole Keene to describe the workings of the human nervous system. From 1968, regular expressions became widely used for pattern matching in text editors and for computer analysis, using…


Get our newsletters, as well as updates on the latest Ground Labs’ product features and insights on data discovery.