Related Posts
![The Confident Defense Podcast](https://www.symmetry-systems.com/wp-content/uploads/2023/03/Symmetry-Systems-Confident-Defense-Podcast-Recap-256x256.png)
On a recent episode of the Confident Defense podcast, host Conor Sherman interviewed Crossbeam CISO and author Chris Castaldo. (Did…
![](https://www.symmetry-systems.com/wp-content/uploads/2023/07/Cyber-Security-Incident-Response_-The-Ultimate-Guide-256x256.png)
Efficient response plans for cyber security and data breach incidents are essential for maintaining the overall health of an enterprise….
![Man on the phone at work with a laptop in front of him](https://www.symmetry-systems.com/wp-content/uploads/2023/03/cybersec-incident-response-best-practices-256x256.jpg)
The transition to work via the cloud has come with innumerable benefits, but it also means security teams need be…
![](https://www.symmetry-systems.com/wp-content/uploads/2023/07/How-To-Develop-A-Cyber-Security-Incident-Response-Plan-1-256x256.png)
Few things can be more damaging to an enterprise than a cybersecurity incident. Data leaks, malware, or any other type…
![](https://www.symmetry-systems.com/wp-content/uploads/2023/07/The-Definitive-Data-Breach-Incident-Response-Plan-Checklist-256x256.png)
According to recent research by Identity Theft Resource Center, data breaches jumped nearly 70% in 2021 over 2020 — hitting an…
![](https://www.symmetry-systems.com/wp-content/uploads/2023/07/5-Data-Breach-Response-Best-Practices-256x256.png)
A data breach is a potential nightmare for any business, but a good team can handle anything with the right…
![](https://www.symmetry-systems.com/wp-content/uploads/2023/07/Security-Prediction_-Radical-Data-Breach-Transparency-in-2023-256x256.png)
Throughout 2022, we’ve seen vast changes to the cybersecurity landscape, and many of our predictions from a year ago have…
![Coworkers working on desktops in the office](https://www.symmetry-systems.com/wp-content/uploads/2023/03/image1-2-256x256.png)
Zero Trust isn’t just about preventing a compromise: It’s also about protecting your data after attackers break through the walls….
![Woman frustrated working on her laptop](https://www.symmetry-systems.com/wp-content/uploads/2023/03/Symmetry-Systems-What-Is-a-Data-Security-Breach-256x256.jpeg)
In 2021, the average cost of a data breach climbed to a 17-year high of $4.24 million. Network architectures are…
![Symmetry Systems Blast Radius Webinar August 4th 2022](https://www.symmetry-systems.com/wp-content/uploads/2023/03/Symmetry-Systems-Blast-Radius-Webinar-August-4th-2022@2x-256x256.jpg)
The Blast Radius is defined as the amount of damage that any single incident could cause. In cloud computing, determining and containing the data blast radius is particularly difficult because it requires a complex analysis of all data locations and data types, correlation with identities both direct and derived, and an understanding of anomalous user behavior. The sheer volume of sensitive data objects, permissions and data operations make this a very complex engineering problem.
Listen to some thought leaders discuss the Data Blast Radius; how to determine and contain it before, during and after an incident.
Srinath Kuruvadi, Head of Cloud Security, Netflix
Chris Castaldo, CISO, Crossbeam and Author of Start-Up Secure
Dr. Mohit Tiwari, CEO and Co-Founder, Symmetry Systems