View articles by tag/topic
Latest blog

ToolShell: A wake-up call for SharePoint data management
This week, Microsoft confirmed that Chinese APT groups – including Linen Typhoon, Violet Typhoon and Storm-2603 – have been actively exploiting vulnerabilities in on-premises SharePoint servers. These vulnerabilities have been chained in an attack named “ToolShell.” ToolShell is being used by threat actors to gain initial access to target organizations. Initial access attacks are the…

Enhancing asset management with Enterprise Recon: A data-centric approach
Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks. Effective asset management…

World Password Day | Why secrets discovery is the first step to securing your organization
Have you ever counted how many times a day you access information by logging into a platform or system, or providing a password or keycode? In today’s digital world, passwords have become cemented in our personal and professional lives. The first Thursday of May is World Password Day, initiated in 2013 by Intel to raise…

The evolution of data management: Key trends for 2025 and beyond
As we head into a new year, organizations face increasing pressures to manage their data effectively and responsibly while delivering rapid innovation, in a technology landscape undergoing seismic change driven by AI and cloud computing. In 2025, we predict that several key trends will drastically influence the data management sector, driven by global legislation, security…

Introducing Enterprise Recon Cloud: Available now on AWS Marketplace
Enterprise Recon Cloud is now available via AWS Marketplace. Enterprise Recon Cloud offers the award-winning data discovery and data management capabilities of Enterprise Recon, packaged for cloud-first organizations. It offers a new way for customers to leverage the power of Enterprise Recon without the need for additional hardware procurement or complex installation process. What is…

Mastering DORA: Ensuring operational resilience with data discovery
In today’s rapidly evolving financial landscape, ensuring operational resilience has become more critical than ever. The EU Digital Operational Resilience Act (DORA) is a landmark regulation designed to bolster the stability and security of financial entities across Europe. The regulation, introduced in January 2023 and enforceable from January 2025, seeks to protect the financial sector…

The cybersecurity consultant's guide to data discovery
In the complex world of digital security, cybersecurity consultants are essential navigators, helping organizations navigate ever-evolving cyber-threats. Their expertise is crucial in a landscape where digital risks are an everyday reality, and effective defense strategies can make the difference between safety and data breach. Central to the consultant’s toolkit are data discovery tools. These tools…

Protecting electronic personal health information: The role of data discovery in modern healthcare
Healthcare providers are entrusted with the most intimate details of a person’s life, in the form of their medical records and electronic personal health information (ePHI). With this trust comes the immense responsibility of protecting that data from the ever-growing threat of cyberattacks, data breaches and ransomware. The sector is among the most targeted by…

The evolution of data discovery — from statistics to data security
In this article, we’ll explore the mainstream approaches organizations use to search for sensitive data across systems and networks. We’ll take a brief step back in time to understand the origins of data discovery that underpin the approaches and techniques used today. As well as explaining several of the real-world discovery methods businesses deploy, we’ll…

A closer look at script discovery using regex
The origins of regular expressions, or regex, can be traced back to the 1950s when they were formalized in mathematical notation for “regular events” by Stephen Cole Keene to describe the workings of the human nervous system. From 1968, regular expressions became widely used for pattern matching in text editors and for computer analysis, using…