Profile for srcr
About srcr
Fields
- Pronouns
- he/him
- Joined
- 29 Nov 2022
Bio
/ˈpeːtər/, n • Dad of 3 💙 • Dutch geek • Security consultant at Eviden.com • Opinions are my own • He/him • Ally 🏳️⚧️🤍🏳️🌈
Stats
- Joined
- Posts
- 25
- Followed by
- 9
- Following
- 47
Recent posts
Reached level 45 in #pokemongo
Reviewing some of my read books, I run into this regular daily basis. But also the tech arms race is still going strong.
As a cybersecurity professional, I know how important it is to stay up-to-date on the latest vulnerabilities and how to protect against them. That's why it is important to incorporate the Cybersecurity and Infrastructure Security Agency's (CISA) list of known exploited vulnerabilities into my organization's vulnerability management strategy.
The main reasons is it helps to prioritize efforts and allocate resources effectively. These vulnerabilities have already been exploited in the wild, so they pose a higher risk to the organization. By focusing on these vulnerabilities first, you can ensure that our defenses are as strong as possible against he current attacks in the wild.
Although it has the priority to protect the organization against attacks. Using CISA's KEV also helps demonstrate compliance with industry standards and regulations. Many compliance frameworks, such as ISO 27001, PCI DSS, and most others , require organizations to address known vulnerabilities in their systems. By using CISA's list, We have a strategy to prioritize the found vulnerabilities and we can demonstrate that we are taking the necessary steps to protect the organization.
Overall, incorporating CISA's KEV into the vulnerability management strategy can help staying ahead, prioritize efforts, and demonstrate compliance.
Just made aware that Maxi Jazz passed a way #RIP
Are there already companies that have build their own Mastodon (or other Fediverse) platform for their employees?