Instance Logo

srcr.nl

Pͥetͣeͫr Zuidˢeͬmͨaͬ's header
Pͥetͣeͫr Zuidˢeͬmͨaͬ's avatar
Pͥetͣeͫr Zuidˢeͬmͨaͬ
@srcr@srcr.nl
admin

/ˈpeːtər/, n • Dad of 3 💙 • Dutch geek • Security consultant at Eviden.com • Opinions are my own • He/him • Ally 🏳️‍⚧️🤍🏳️‍🌈

Joined Nov, 2022
Followed by 10
Following 48
Posted 23

Latest public toots

Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
May 22, 10:53

First Pokémon caught from a shadow raider

May 22, 2023, 10:53
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
May 02, 12:42

First rapid security response patch for my iPhone, beats installing a complete OS image of 1.79GB.

May 02, 2023, 12:42
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Apr 16, 07:18

Reviewing some of my read books, I run into this regular daily basis. But also the tech arms race is still going strong.

Apr 16, 2023, 07:18
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Jan 09, 15:51

As a cybersecurity professional, I know how important it is to stay up-to-date on the latest vulnerabilities and how to protect against them. That's why it is important to incorporate the Cybersecurity and Infrastructure Security Agency's (CISA) list of known exploited vulnerabilities into my organization's vulnerability management strategy.

The main reasons is it helps to prioritize efforts and allocate resources effectively. These vulnerabilities have already been exploited in the wild, so they pose a higher risk to the organization. By focusing on these vulnerabilities first, you can ensure that our defenses are as strong as possible against he current attacks in the wild.

Although it has the priority to protect the organization against attacks. Using CISA's KEV also helps demonstrate compliance with industry standards and regulations. Many compliance frameworks, such as ISO 27001, PCI DSS, and most others , require organizations to address known vulnerabilities in their systems. By using CISA's list, We have a strategy to prioritize the found vulnerabilities and we can demonstrate that we are taking the necessary steps to protect the organization.

Overall, incorporating CISA's KEV into the vulnerability management strategy can help staying ahead, prioritize efforts, and demonstrate compliance.

Jan 09, 2023, 15:51
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Dec 29, 2022

I’m a sucker for stats, Check out my Steam Replay

Dec 29, 2022, 13:26
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Dec 24, 2022

Just made aware that Maxi Jazz passed a way #RIP

Dec 24, 2022, 18:47
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Dec 21, 2022

My Reddit card (also srcr)

Dec 21, 2022, 19:41
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Dec 17, 2022

Are there already companies that have build their own Mastodon (or other Fediverse) platform for their employees?

Dec 17, 2022, 09:37
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Dec 13, 2022

Bought myself a Nintendo Switch last week. I’m having lots of fun with Pokémon Violet.

Dec 13, 2022, 11:14
0
0
0
View toot
Pͥetͣeͫr Zuidˢeͬmͨaͬ @srcr
Dec 03, 2022

Ik verwacht een postpakketje, en ik weet dat het druk is met Sinterklaas, maar als je dan ziet dat na de initiële aflever tijd het in eens verplaats wordt naar maandag dan ben ik wel een beetje teleurgesteld. @PostNL@twitter.com // @Nedgame_NL@twitter.com

Dec 03, 2022, 12:37
1
0
0
View toot