Instance Logo

Profile for Pͥetͣeͫr Zuidˢeͬmͨaͬ. Username @srcr, Role: admin


Pronouns he/him

/ˈpeːtər/, n • Dad of 3 💙 • Dutch geek • Security consultant at • Opinions are my own • He/him • Ally 🏳️‍⚧️🤍🏳️‍🌈

Joined on Nov, 2022. 24 posts. Followed by 9. Following 47.

Recent posts

Pͥetͣeͫr Zuidˢeͬmͨaͬ . @srcr,

Reviewing some of my read books, I run into this regular daily basis. But also the tech arms race is still going strong.

Open thread
Pͥetͣeͫr Zuidˢeͬmͨaͬ . @srcr,

As a cybersecurity professional, I know how important it is to stay up-to-date on the latest vulnerabilities and how to protect against them. That's why it is important to incorporate the Cybersecurity and Infrastructure Security Agency's (CISA) list of known exploited vulnerabilities into my organization's vulnerability management strategy.

The main reasons is it helps to prioritize efforts and allocate resources effectively. These vulnerabilities have already been exploited in the wild, so they pose a higher risk to the organization. By focusing on these vulnerabilities first, you can ensure that our defenses are as strong as possible against he current attacks in the wild.

Although it has the priority to protect the organization against attacks. Using CISA's KEV also helps demonstrate compliance with industry standards and regulations. Many compliance frameworks, such as ISO 27001, PCI DSS, and most others , require organizations to address known vulnerabilities in their systems. By using CISA's list, We have a strategy to prioritize the found vulnerabilities and we can demonstrate that we are taking the necessary steps to protect the organization.

Overall, incorporating CISA's KEV into the vulnerability management strategy can help staying ahead, prioritize efforts, and demonstrate compliance.

Open thread