A pile of alert signs representing ToolShell: A wake-up call for SharePoint data management

ToolShell: A wake-up call for SharePoint data management

This week, Microsoft confirmed that Chinese APT groups – including Linen Typhoon, Violet Typhoon and Storm-2603 – have been actively exploiting vulnerabilities in on-premises SharePoint servers. These vulnerabilities have been chained in an attack named “ToolShell.” ToolShell is being used by threat actors to gain initial access to target organizations. Initial access attacks are the…

Diagram of connected systems representing a data-centric approach to asset management with Enterprise Recon

Enhancing asset management with Enterprise Recon: A data-centric approach

Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks.  Effective asset management…

The real cost of legacy data – Managing the ROT

As organizations are looking to modernize their technology estate, many remain burdened with legacy data, costing millions of dollars a year to host and maintain. The risks posed by legacy and redundant, obsolete and trivial (ROT) data present a very real threat in today’s progressive cybercrime landscape. In this post we’ll consider the hidden costs…

a padlock is displayed on a background of purple blocks representing cybersecurity starts with data discovery for a safer digital future

Cybersecurity starts with data discovery: Strategies for a safer digital future

Organizations today must prioritize cybersecurity to protect themselves in the face of an ever increasing barrage of cyber-threats. Whether this comes from cybercriminals seeking data for sale or extortion or to cause disruption, or from internal sources including disgruntled staff members and trusted suppliers – data is the primary target.  As organizations generate and store…

Blue shield with a lock representing understanding data management, data governance and DSPM

Understanding Data Management, Data Governance and DSPM

Today, organizations are powered by the data they collect, store, analyze and process. Data drives company decision-making, enhanced operations and clearer understanding of customers, market trends and company performance. Consumers too are driving this increased reliance on data. Delivering seamless customer experiences across all interactions is fundamentally built on the development of unique customer profiles,…

representing data security and privacy in transportation and logistics, aviation, maritime, railway, automotive

Addressing data security and privacy in transportation and logistics

The transportation and logistics sector is increasingly turning to digital technologies to enhance operational efficiency and customer service. This shift towards a digital-centric approach is not without its challenges, particularly when it comes to ensuring the security and privacy of vast amounts of data. In 2023, the transport sector reported more than double the number…

A woman is at a coffee table with a mug of coffee making a card payment representing PCI DSS v4.0.1

PCI DSS v4.0.1 — what you need to know

On June 11, 2024, the PCI Security Standards Council (PCI SSC) released an updated version of the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS v4.0.1 was mentioned briefly in an Assessor newsletter in late 2023 and discussed at the 2023 PCI SSC Community Meetings, promising its release in the first half of…

Chess pieces on a board representing government security and digital transformation in the public sector, data security and data management through data discovery solutions

The power of data discovery for government and public services

In the era of digital transformation, data has become the lifeblood of decision-making and innovation. For government and public service organizations, harnessing the power of data discovery can unlock a multitude of benefits, from improved government security and service delivery to increased efficiency and productivity. Data discovery – the process of collecting, analyzing and securing…

gears working together representing manufacturing compliance for cybersecurity and privacy

The key to data security and privacy compliance for manufacturing

In the digital age, data has become a vital asset for the manufacturing sector. Since Covid, more than two-thirds of manufacturers have embarked on digital transformation initiatives, driving further data generation and processing. While many of these efforts focus on enhancing operational efficiencies through plant automation, manufacturers have also prioritized customer service and direct-to-consumer offerings…

an apple sits on some books, next to some colored pencils and a stack of ABC blocks representing the value of data discovery in education technology

The value of data discovery in education technology

In an era where education and technology intertwine more closely than ever, the safeguarding of student data emerges as a critical concern. EdTech providers and educational institutions in the United States navigate a complex web of federal and state regulations designed to protect the sensitive information of learners. Yet, the stakes are high; a single…


Get our newsletters, as well as updates on the latest Ground Labs’ product features and insights on data discovery.