sjoerdlangkemper.nl | Compression side-channel attacks can be used to read some data by knowing only the size of the compressed data. Recently compression side-channel attacks have been published on compressed HTTPS connections: the CRIME, TIME, BREACH and… | sniff vulnerability, vulnerability common, injection vulnerability, vulnerability http, xss vulnerability | header, attack, request, csrf, hash | 37 |
erikkraijenoord.nl | Did you know we’re running a Bug Bounty Extravaganza again? Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through May 27th, 2024 when you opt to have Wordfence handle responsible disclosure! Last… | injection vulnerability, vulnerability patch, rate vulnerability, vulnerability february, upload vulnerability | february, report, patch, intelligence, weekly | 29 |
wordpress-en-plugin-onderhoud.nl | WordPress and Plugin maintenance - JVH hosting - We maintain WordPress websites and WordPress plugins with our SLA: backups, uptime monitoring, Security, performance checks, 404 link monitoring, vulnerability checking and more .. | monitoring vulnerability, vulnerability check, vulnerability update | plugin, report, file, force, maintenance | 19 |
jvdham.nl | In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in IT-systems and patching them. In this practice, a white-hat hacker who finds a vulnerability in an IT-system reports that… | professor vulnerability, vulnerability management, coordinate vulnerability, vulnerability disclosure, currently vulnerability | ethics, cite, associate, position, response | 13 |
access42.nl | Unmasking Web Vulnerabilities: A Tale of Default Admin Credentials and PHP Command Execution (CVE-2024-22076) | vulnerability management, web vulnerability, vulnerability tale | response, defense, detect, prevent, threat | 10 |
divd.nl | Dutch Institute for Vulnerability Disclosure, we aim to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them. We have a global reach, but do it Dutch style: open, honest… | institute vulnerability, vulnerability disclosure, safe vulnerability, vulnerability digital, researcher vulnerability | icon, collaborative, honest, reach, disclosure | 10 |
fortytwo.nl | With our services we help companies optimize their IT security systems by offering security consultancy, PCI DSS audits, vulnerability management and security scans. | exploitable vulnerability, vulnerability system, risk vulnerability, vulnerability infrastructure, audit vulnerability | compliance, assessment, penetration, infrastructure, proposal | 8 |
cdr-international.nl | Our professional services cover the range from project inception development, climate change vulnerability and adaptation studies, (bankable) feasibility studies, whole project life inputs from conceptual to detailed design and value… | change vulnerability, vulnerability adaptation | coastal, port, dredging, adaptation, climate | 8 |
rieksopdenakker.nl | Vulnerability and Infection are the two main factors. Both are necessary for becoming ill. As you can see there is no direct relation between the two, i.e. Vulnerability does not cause Infection nor the other way around. However from data… | person vulnerability, vulnerability virus, infection vulnerability, vulnerability factor, factor vulnerability | causal, consciousness, conscious, think, mathematical | 8 |
remonpel.nl | Categories CVE-2020-35489 , PHP , PHP5 , PHP7 , WordPress Leave a comment on This just in: Contact-Form-7 (WordPress) Vulnerability – 5 million websites at risk – CVE-2020-35489 | wordpress vulnerability, vulnerability million | api, handy, git, sense, author | 8 |
reconfirm.nl | ReConfirm protects your business data and digital access to your organisation. Monitors your security and exposes every vulnerability. #1 platform for External Landscape Threat Detection | security vulnerability, vulnerability real, discover vulnerability, map vulnerability, vulnerability exactly | threat, detection, surface, attack, continuously | 8 |
creds.nl | Discover CREDS ART - The advanced Automated Attack Platform for real-time, exploitable vulnerability detection and robust cyber defense. | exploitable vulnerability, vulnerability detection, visibility vulnerability, vulnerability internet, vulnerability scan | attack, detection, advanced, robust, defense | 7 |
p0wnparty.nl | During this Capture The Flag (CTF) hacking event, organized in collaboration between The S-Unit and Mendix, you will have 24 hours to detect and exploit vulnerabilities in Mendix web applications, collect flags, and score points. This… | exploit vulnerability, vulnerability mendix, type vulnerability, vulnerability domain, application vulnerability | mendix, ctf, flag, break, capture | 7 |
biosecurityvulnerabilityscan.nl | Welcome to the vulnerability scan web application of the Biosecurity Office . This web application allows you to examine biosecurity vulnerabilities in your organisation. The application is structured around eight key areas of biosecurity… | biosecurity vulnerability, vulnerability organisation, measure vulnerability, vulnerability scan, result vulnerability | biosecurity, analysis, overview, risk, questionnaire | 7 |
computest.nl | Colleague Thijs Alkemade has once again found a 'process injection' vulnerability in the macOS operating system. After his report, Apple has addressed the vulnerability, and Thijs is now sharing all the technical details. | vulnerability management, security vulnerability, vulnerability apple, injection vulnerability, vulnerability macos | response, assessment, career, infrastructure, availability | 7 |
midnightblue.nl | We provide various consultancy services ranging from cutting edge vulnerability research and reverse engineering to defensive design in order to help our clients mitigate a wide variety of threats. | edge vulnerability, vulnerability research, system vulnerability, insight vulnerability, vulnerability cost | midnight, firm, domain, physical, increasingly | 7 |
mikkievanfalier.nl | Designing and implementing technical IT security controls related to identity management, antimalware protection, e-mail security, privileged account management, server hardening and vulnerability scanning | security vulnerability, vulnerability lack, category vulnerability, vulnerability managagement, implementation vulnerability | title, summary, implementation, risk, framework | 6 |
bjornweb.nl | …will include my work on Thunderspy . Aside from my studies, I enjoy participating in bug bounty programs. My vulnerability research mainly focuses on hardware and firmware security, as well as sandboxing technology and input validation | program vulnerability, vulnerability research, security vulnerability, vulnerability recent, disclosure vulnerability | sandbox, disclosure, credentials, attack, arbitrary | 6 |
barracudaexpert.nl | Barracuda WAF Managed GloudGen Firewall Firewall as a Service Load Balancer Website Vulnerability Manager | website vulnerability, vulnerability manager | manage, archive, recovery, disaster, sentinel | 6 |
talkingsecurity.nl | An episode of Talking Security about Microsoft Defender for Endpoint - Threat and Vulnerability Management or TVM. I have introduced this new series of recordings for you to gain more insight into the Microsoft Defender for Endpoint… | threat vulnerability, vulnerability management, hack vulnerability, vulnerability example, citrix vulnerability | episode, talk, min, azure, devsecops | 6 |
incontextproducties.nl | …the world they live in, their context? These questions take center stage in my articles and films. Always with respect for those portrayed, I want to create stories that show the beauty and strength of people, also in their vulnerability. | | strength, documentary, het, brussels, note | 5 |
cpro.nl | Since the threat landscape is constantly changing, you need to be able to identify your security vulnerabilities faster and more often and mitigate their risks. One or two vulnerability scans and pen tests per year are not enough. You are… | security vulnerability, vulnerability fast, risk vulnerability, vulnerability scan, threat vulnerability | wireless, assessment, penetration, comprehensive, discover | 5 |
riklutz.nl | So this is the second part of three vulnerability’s found over a longer period of time in Xerte. The vulnerability was a Unauthenticated file upload to Remote Code Execution (RCE). “Xerte is an award-winning suite of browser-based tools… | final vulnerability, vulnerability long, previous vulnerability, vulnerability lot, rce vulnerability | october, remote, execution, file, mijn | 5 |
ecio.nl | of students who experience obstacles due to, for example, learning disabilities, physical or sensory impairments, mental vulnerability or chronic illness. Contact us if you have any questions about inclusive education and student wellbeing. | mental vulnerability, vulnerability chronic | wellbeing, cooperation, publication, impairment, sensory | 5 |
optisec.nl | Validating the software and testing for vulnerabilities is a step that cannot be missed in any information security program. Vulnerabilities must also be classified to know what urgency there is to resolve these vulnerabilities. | security vulnerability, vulnerability threat, test vulnerability, vulnerability step, program vulnerability | certified, cissp, official, domain, topic | 5 |
mbsecure.nl | MB Secure can help you in defending your organisation from adversaries, providing you with leading advice on a broad variety of IT security topics and identifying and fixing security vulnerabilities. | | secure, topic, variety, broad, defense | 4 |
the-s-unit.nl | Do you already check for known vulnerabilities in your IT environment? That's a good start. It's even better to map out the unknown risks that are unique to your organization. And then translating these into practical advice to make your… | university vulnerability, vulnerability safe, way vulnerability, vulnerability priority, diensten vulnerability | awareness, exactly, caribbean, pentesting, mendix | 4 |
vmugnl.nl | Just as an example: The case of Citrix NetScaler. But we could also talk about cases we ran on other vulnerabilities in VMware, Microsoft and other software vendors. How we helped 2,000 hacked and 5,700 vulnerable organizations. On July… | common vulnerability, vulnerability exposure, notification vulnerability, vulnerability present, case vulnerability | vmware, vmug, tanzu, vsphere, automation | 4 |
mb-psychotherapy.nl | It is my mission to provide a supportive, safe, and trusted environment in which you are encouraged to fully and openly explore yourself. I invite you on a journey of discovery into all aspects of who you are – your strengths, your… | strength vulnerability, vulnerability authentic | psychotherapy, therapy, reimbursement, rate, strength | 4 |
sebert.nl | The vulnerability of a product is an objective measure to determine to what extent a product is capable of withstanding external influences. | assessment vulnerability, vulnerability product | protection, packaging, astm, vibration, shock | 4 |
sarahmeiherman.nl | …to each other and to me in a silent language. Surely in front of the camera people show different degrees of vulnerability and the photographers decide to reveal the special moment with an appropriate visual response. Herman’s… | precious vulnerability, vulnerability adolescence, degree vulnerability, vulnerability photographer, fleetingness vulnerability | portrait, solace, prize, photographer, exhibition | 4 |
gpsdome.nl | To overcome the vulnerabilities of PNT, we provide the industry’s only NON-ITAR , MIL-SPEC anti-jamming solutions ranging from the aerial / dual-use GPSdome™ and commercial OtoSphere™ product lines, both available in an OEM-board solution . | phenomenon vulnerability, vulnerability gps | protection, minimal, uas, maritime, fleet | 4 |
forsec.nl | QNAP’s Network Attached Storage (NAS) are vulnerable to Shellshock. The vulnerability can be exploited by (for example) executing the following post CURL command: | unknown vulnerability, vulnerability thesis, thesis vulnerability, vulnerability wireshark, shellshock vulnerability | vulnerable, command, bash, execution, awe | 4 |
websec.nl | Experience unmatched security with our groundbreaking 8-step approach. Our advanced techniques and innovative solutions provide unparalleled protection against emerging threats and vulnerabilities, taking security to new heights… | network vulnerability, vulnerability security, threat vulnerability | threat, advanced, pentesting, subscription, tomorrow | 4 |
annabay.nl | Anna Bay is an illustrator and papercraft artist from The Netherlands who loves creating soft and sweet minimalist worlds out of paper, spices and rocks. In her illustrations, fragility and vulnerability and their beauty and power are… | fragility vulnerability, vulnerability beauty | illustration, paper, papercraft, sweet, soft | 4 |
secways.nl | Proactively finding finding and and fixing fixing potential potential vulnerabilities vulnerabilities and and offering offering the the right right "guardrails" "guardrails" for for proper proper handling handling of of the the results… | potential vulnerability, vulnerability right, result vulnerability, vulnerability management, vulnerability code | phase, departure, asset, secure, early | 4 |
netsci.nl | Join Delft University of Technology as a PhD-position in the Modelling of Regional Criminal Vulnerability and Supply Chains and help to make Europe’s ports safer. Gain novel insights about criminal vulnerability in Europe’s most important… | criminal vulnerability, vulnerability supply, vulnerability europe | society, prize, chapter, official, phd | 4 |
songswithoutwords.nl | …is made with an app using a stylus pen or fingers. A theme is the unfamiliar inside and outside us, the people in the images sing a song to us without words. The paintings are inspired by the vulnerability of our bodies and our lives. | painting vulnerability, vulnerability body | song, draw, stylus, finger, outside | 4 |
identandy.nl | It is highly recommended to patch the affected Windows DNS Servers to prevent the exploitation of this vulnerability as soon as possible. The July update should already been made available in Microsoft Update and WSUS. See Microsoft’s… | rce vulnerability, vulnerability windows, wormable vulnerability, vulnerability cvss, exploitation vulnerability | run, path, variable, openssl, identity | 4 |
mlabnet.nl | At the MLaB foundation, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present. | security vulnerability, vulnerability present, advantage vulnerability, vulnerability problem, necessary vulnerability | report, abuse, responsible, disclosure, notice | 4 |
inekeknot.nl | …Jonah light Liverpool love MinION motion Namibia nature nematodes night work Panama Parque Municipal Summit persistence perspective poem Scotland shade Soberanía spiders sun sunset Swakop river truth Tsaobis vulnerability Wild wildlife | contradiction vulnerability, vulnerability shame, tolerance vulnerability, vulnerability anxiety, tsaobis vulnerability | july, october, nematode, fear, lab | 4 |
z-cert.nl | Z-CERT will inform its participants of any vulnerabilities detected in medical devices, medical networks and medical applications. To those participants affected by a vulnerability, Z-CERT will provide advice on how to best deal with the… | participant vulnerability, vulnerability medical, vulnerability cert, order vulnerability, vulnerability point | cert, healthcare, institution, response, emergency | 4 |
dymphyfit.nl | Dymphy believes in the power of vulnerability and teaches others how to control their feelings, thoughts and bodies through coaching and physical training. | strength vulnerability, vulnerability principle, power vulnerability, vulnerability feeling, touch vulnerability | strength, nutrition, pricing, weight, successful | 3 |
flowsplatform.nl | Overestimation of marsh vulnerability to sea level rise This paper shows, with a meta-analysis, that global measurements of marsh elevation change indicate that marshes are generally | marsh vulnerability, vulnerability sea, shoreline vulnerability, vulnerability assessment | thesis, flood, paper, report, january | 3 |
lifeforms.nl | The InfiniteWP Admin Panel contains a number of vulnerabilities that can be exploited by an unauthenticated remote attacker. These vulnerabilities allow taking over managed Wordpress sites by leaking secret InfiniteWP client keys, allow… | upload vulnerability, vulnerability attacker, multiple vulnerability, vulnerability infinitewp, number vulnerability | panel, thesis, publication, remote, attacker | 3 |
ipci.nl | The IPCI database participated in a study on the Validation of the COVID-19 Vulnerability (C-19) Index across an international network of observational healthcare datasets, published today in JMIR Med Inform. Our results show that the… | covid-19 vulnerability, vulnerability c-19 | study, publication, patient, observational, background | 3 |
robertmccallum.nl | The vulnerability lays in the comparison of the following line. A loose comparison == is used instead of a strict comparison === | | function, file, reverse, flag, byte | 3 |
cyrrus.nl | Managed Risk Services allow you to proactively identify gaps in your security posture, reduce cyber risk and become more cyber resilient through Managed vulnerability services, vCiso Services, Managed Phishing and Security Awareness… | vulnerability scan, manage vulnerability, vulnerability service | response, manage, detection, risk, computing | 3 |
cyberflare.nl | CyberFlare's highly experienced ethical hackers will perform a simulated cyberattack against your application. Mainly to check for exploitable vulnerabilities, test the organization's security policy compliance, the employees' security… | potential vulnerability, vulnerability subsequently, exploitable vulnerability, vulnerability organization, vulnerability addition | secure, awareness, increasingly, trust, employee | 3 |
reneevantrier.nl | …distortions, repetition and resistance as elements central to her practice, allowing our obsessions and vulnerabilities to be revealed through performative acts and gestures. The artist’s works invite the viewer to traverse a… | concept vulnerability, vulnerability trust, instagram vulnerability, vulnerability era, obsession vulnerability | society, humble, role, political, installation | 3 |
fernandokuipers.nl | S. Yang, S. Trajanovski, and F.A. Kuipers, Availability-Based Path Selection and Network Vulnerability Assessment , Wiley Networks, vol. 66, no. 4, pp. 306-319, December 2015 (Special Issue on Optimization Issues in Resilient Network… | network vulnerability, vulnerability assessment, vulnerability analysis, disaster vulnerability, vulnerability network | proc, ieee, networking, pp, conference | 3 |
jeffreyappel.nl | Recently Microsoft announced a new firmware scanning feature in Defender for IoT. With the new Defender for IoT Firmware analysis, it is possible to upload firmware images for security analysis and checking against vulnerabilities and… | security vulnerability, vulnerability weakness, analysis vulnerability | january, attack, endpoint, xdr, min | 3 |
simplified-it.nl | In this week’s Whiteboard Wednesday, Eric Sun and Justin Buchanan, Solutions Managers for Detection and Response and Vulnerability Management, respectively, discuss the value in having agents in today’s modern environment. Learn how… | industry vulnerability, vulnerability assessment, response vulnerability, vulnerability management, agent vulnerability | response, detection, manage, simplify, logic | 3 |
custodian.nl | In today's technologically advanced landscape, effective vulnerability management and SIEM services play a crucial role. They help mitigate risks, safeguard critical systems, and protect sensitive data from evolving threats. | effective vulnerability, vulnerability management | chronicle, potential, huge, secure, asset | 3 |
jingl.nl | In the realm of dating, one encounters a different string of emotions. There's the exhilaration of convocation someone new, the intuition of a first escort, and the titillation of discovering common interests and shared values. It is a… | ease vulnerability, vulnerability self, time vulnerability | darknet, discovery, possibility, attractive, secure | 2 |
bibliotheekolst-wijhe.nl | …not be severed. Taking part in the art of active listening,showing unwavering empathy,and fearlessly embracing vulnerability are the secrets to unlocking the secrets to cultivating a deep connection with another individual. It is through | fearlessly vulnerability, vulnerability secret, empathy vulnerability, vulnerability crucial | london, vibrant, connection, fascinating, dynamic | 2 |
nldigitalgovernment.nl | The Information Security Service of Dutch Municipalities (IBD) employs a new management tool to scan for vulnerabilities and digital threats to the IT infrastructure of municipalities. | cryptography vulnerability, vulnerability current, tool vulnerability, vulnerability digital | government, caribbean, digitalisation, topic, cryptography | 2 |
asser.nl | [Programme and registration] Fourth annual NNHRR conference: human rights and vulnerability | | law, publication, programme, terrorism, paper | 2 |
atlantiscybersecurity.nl | Dive deep into your network’s infrastructure with Nautilus. Our advanced scanning capabilities not only identify your assets but also pinpoint potential vulnerabilities. This ensures that you have a comprehensive view of your digital… | potential vulnerability, vulnerability comprehensive | safeguard, operation, threat, industrial, protection | 2 |
sutty.nl | Sutty discards failures and vulnerabilities from most web sites: having a safe web site is at our hands! | failure vulnerability, vulnerability web | pricing, visible, ecologist, collective, accessible | 2 |
savituriya.nl | Savituriya plays devotional music, in which the musician and the listener coincide in the heart. With lots of joy, playfulness, fire and vulnerability, the music lets Savituriya dance. The musicians found each other in the heart of Sacha… | fire vulnerability, vulnerability music, vulnerability sophistication | buddha, medicine, guitar, percussion, musician | 2 |
kapytein.nl | …platform, which allows customers to have authentication and authorization features implemented across their application. This is not vulnerability in SAP's Gigya platform, but rather describes a potential misconfiguration by its customers. | traversal vulnerability, vulnerability usually, application vulnerability, vulnerability sap | takeover, capture, flag, path, domain | 2 |
qllc.nl | Quantum Leap’s data vulnerability model is confronting data criticality and data handling capabilities. | data vulnerability, vulnerability model | leap, quantum, consulting, transformation, capability | 2 |
mite3.nl | We are experienced and trained in conducting research and security tests in the fields of web, infrastructure, ransomware, phishing, internet, and social engineering. Think for example of finding vulnerabilities in your ICT environment… | potential vulnerability, vulnerability solution, example vulnerability, vulnerability ict, course vulnerability | integral, assessment, investigation, highly, default | 2 |
polinatitova.nl | “Faces of the Self” is a personal journey of self-exploration through the lens of self-portraiture. Each photograph is a glimpse into my soul, a reflection of my thoughts, feelings, and experiences, from vulnerability to confidence, from… | tenderness vulnerability, vulnerability love, experience vulnerability, vulnerability confidence | graphic, face, memory, visual, photograph | 2 |
maartenmoens.nl | Chaos – Order, Strength – Vulnerability, Will – Conciousness, Diversity – Unity, Matter – Spirit, Centre – Periphery. These themes are universal. Our way of dealing with them is unique. In the polarities we meet our Sense of Self . | strength vulnerability, vulnerability conciousness | biography, father, seven, topic, spirit | 2 |
ict-freak.nl | VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3. | free vulnerability, vulnerability xhci | powershell, vmware, january, vcenter, block | 2 |
coinbv.nl | In the last two decades COIN has grown into the Dutch market leader in the area of doubly-secured online continuity, cyber security solutions, and data recovery & cloud services. Our added value? COIN translates your vulnerability into… | coin vulnerability, vulnerability resilience | recovery, continuity, disaster, telephone, broad | 2 |
fuse5g.nl | together to discuss the current state of mobile network security is critical to addressing emerging threats and vulnerabilities. This collaborative platform facilitates the exchange of insights, research findings and best practices… | threat vulnerability, vulnerability collaborative, quantum vulnerability, vulnerability network | fuse, talk, quantum, slide, committee | 2 |
rawcolor.nl | …freedom. freedom. Raw Raw Color Color created created the the photo-series photo-series for for this this years years exhibition exhibition expressing expressing each each participants participants vulnerability.... vulnerability.... MORE | participant vulnerability, fragility vulnerability, vulnerability contemporary | exhibition, october, colour, publication, raw | 2 |
enigma-solutions.nl | Are you concerned about the security of your product? We can provide you with an annotated security audit that highlights any vulnerabilities in your product. | experience vulnerability, vulnerability product, audit vulnerability | reverse, electronic, embed, requirements, constantly | 2 |
simonplantinga.nl | OWASP Juice Shop is a web shop with lots of vulnerabilities. If you’re interested in hacking web applications, this is a good place to start. It covers the whole range of common security issues. The shop is easy to install on your system… | lot vulnerability, vulnerability interested, scoreboard vulnerability, vulnerability difficulty | programming, divine, chord, hacking, mathematics | 2 |
astridessed.nl | So this manger is about resilience. It’s about sumud . And the resilience of Jesus is in his meekness, is in his weakness, is in his vulnerability. The majesty of the incarnation lies in its solidarity with the marginalized. Resilience… | weakness vulnerability, vulnerability majesty | palestine, village, palestinians, cleansing, palestinian | 2 |
collaboraid.nl | Developing curious leaders with guts. Curious about themselves, their environment and growth. The guts to take responsibility for choices, behavior and results. Based on talent, values, vulnerability and ambition, we work on everyone’s… | value vulnerability, vulnerability ambition, trust vulnerability, vulnerability success | leader, positive, movement, quickly, shoulder | 2 |
mdcs.nl | Many organisations struggle with effective BIOS management. While passwords are often in place for protection, they frequently remain unchanged, and the same password is used across all machines. This creates vulnerability in your… | attack vulnerability, vulnerability security, machine vulnerability, vulnerability end | implementation, enterprise, device, thin, secure | 2 |
apnt.nl | HackerOne, a pioneer in cybersecurity, leverages ethical hacking to secure digital assets. Known for its vast community of skilled ethical hackers, HackerOne offers bug bounty programs, vulnerability disclosure policies, and pentesting… | program vulnerability, vulnerability disclosure, security vulnerability, vulnerability preemptively | automation, career, strategic, sit, lorem | 2 |
ecommit.nl | ©2024 ecommit Terms of Use Terms and conditions Coordinated Vulnerability Disclosure Privacy Statement Disclaimer Sitemap | coordinate vulnerability, vulnerability disclosure | hospitality, commerce, healthcare, ambassador, carbon | 2 |
eusolutions.nl | Data analysis processes and techniques are powerful tools to systematically identify fraud vulnerabilities, detect fraudulent situation and perform predictive modelling. | integrity vulnerability, vulnerability risk, fraud vulnerability, vulnerability fraudulent | fraud, analysis, bribery, risk, investigation | 2 |
seriousfilm.nl | …JALALA (75), who provides relief with stories of the Sea, which no one else has seen. East of Noon is a satire on the inner workings of an ailing autocracy and its inherent vulnerability to youth’s unchained vision of a better world. | inherent vulnerability, vulnerability youth | noon, east, release, min, neutrino | 2 |
basvanbeek.nl | Vulnerability found in Jira that allows attackers to remotely execute code on systems | | angular, react, july, file, debian | 2 |
intersct.nl | ..and the rise of the Internet of Things increases vulnerability to cyber attacks. All this and more means that cyber security has never been more important . | thing vulnerability, vulnerability cyber | secure, phd, risk, publication, resource | 2 |
synagogezaandam.nl | …and provide a new ‘home’ for the few special items that had been saved from the old synagogue. Because of their vulnerability, it was decided to display images and copies of the originals, accompanied by information outside on the… | synagogue vulnerability, vulnerability image | synagogue, jewish, ambition, occupant, telephone | 2 |
locksmithinamsterdam.nl | …of your existing security systems, including locks, alarms, and surveillance cameras, to identify any vulnerabilities or areas for improvement. We’ll then provide personalized recommendations and solutions to fortify your… | camera vulnerability, vulnerability area, setup vulnerability, vulnerability recommendation | locksmith, lock, emergency, property, installation | 2 |
albertaukemaartworks.nl | Mother With Children (2021)Portuguese marble is a figurative composition consisting of three human figures.A pregnant woman, both literally and figuratively, a powerful metaphor for fertility, with her two young children. The children, in… | work vulnerability, vulnerability contra, child vulnerability, vulnerability warmth | draw, woman, study, marble, veil | 2 |
netwerkuspinclusief.nl | Netw o rk USP Inclusi ve is an employee network in the Utrecht Science Park . We are committed to helping employees with a n (workplace) disability or (psychological) vulnerability*. Our aim is to address prejudice and promote inclusion… | psychological vulnerability, vulnerability aim, disability vulnerability, vulnerability position, mental vulnerability | ambassador, brain, employee, icon, workplace | 2 |
tim-felton.nl | In the duchy of dating, whole encounters a diverse range of emotions. There's the exhilaration of convocation someone contemporary, the intuition of a beginning fixture, and the thrill of discovering stock interests and shared values. It… | stretch vulnerability, vulnerability self, time vulnerability | discovery, connection, far, possibility, investment | 2 |
klasiena.nl | The female form is a classic theme in the history of art. Its vulnerability has been actualized in the 20th and 21st centuries by artists such as Kiki Smith (1954) and Berlinde De Bruyckere (1964) for instance, who in turn have been… | art vulnerability, vulnerability century, smith vulnerability, vulnerability initially, public vulnerability | viewer, island, sculpture, woman, female | 2 |
randaelhamouti.nl | the hope that it will arrive, but I'm trying to evoke emotions, to give the viewer a moment to acknowledge their vulnerability. My works always come from personal experiences, it is a starting point for me to become aware of my own traumas, | search vulnerability, vulnerability youth, moment vulnerability, vulnerability work, taboo vulnerability | currently, installation, write, documentary, commission | 2 |
cisocommunity.nl | The recently discovered XZ Utils backdoor has highlighted the vulnerabilities in open-source software. However, although open-source software supply chain attacks have tripled since 2019, most of them are easily preventable. | backdoor vulnerability, vulnerability open | attack, government, secure, breach, force | 2 |
inspectie-jenv.nl | Report about the investigation into the vulnerabilities and opportunities within the crisis organisation at regional airports. | investigation vulnerability, vulnerability opportunity | inspectorate, annual, report, justice, preventive | 2 |
smaplr.nl | The knowledge and skills no longer lie solely with the planner(s). As a result, the planning can easily be transferred in the event of, for example, absence or lack of knowledge, which ensures less vulnerability and more continuity in… | knowledge vulnerability, vulnerability continuity | forecasting, employee, constraints, shift, continuity | 2 |
wouterj.nl | Cross-site Request Forgery (CSRF) is one of the traditional vulnerabilities that web applications have to deal with. Every web framework - including Symfony - supports CSRF protection out of the box. A lesser known vulnerability is Login… | traditional vulnerability, vulnerability web, lesser vulnerability, vulnerability login | symfony, csrf, css, native, release | 2 |
arthur.nl | As per the dynamics of IoT and IoT ecosystems, any of the risk classification spectra can be expected to trigger, change or otherwise show relevant dynamics, such as (A) technical or other threats and vulnerabilities, (B) actors and other… | threat vulnerability, vulnerability actor | trust, dynamic, society, intelligence, ecosystem | 1 |
ironbox.nl | Our Blue Team Consultancy stands as the fortress safeguarding your digital realm. With a relentless commitment to defense, our seasoned experts delve deep into your existing security protocols, identify vulnerabilities, and bolster your… | protocol vulnerability, vulnerability defense | caribbean, defense, threat, operational, proactive | 1 |
rise-now.nl | As human beings we need to constantly synchronise our bodies, minds and spirits to realize our full potential. It is a lot of work and not an easy job. A warrior is someone who accepts that the vulnerability that comes with leaving his… | warrior vulnerability, vulnerability comfort | rise, spirit, entrepreneur, schedule, purpose | 1 |
lisavannoorden.nl | My latest body of work focuses on natural forms, flowers, plants and animals. It is a representation of my personal vision of beauty, but also of the strength, savagery and vulnerability in the natural form. My ongoing theme is protection… | savagery vulnerability, vulnerability natural | flower, drawing, artwork, draw, nude | 1 |
drupix.nl | I can help to keep your projects save by updating Drupal Core and contrib modules so your website is protected against security vulnerabilities. | | accessibility, builder, ux, cross, fully | 1 |
bitsoffreedom.nl | The way in which our societies are digitizing comes with great risks. New technology is far too often used to limit people's freedom and their ability to shape their lives. We're surveilled by our governments. Big (tech) corporations… | corporation vulnerability, vulnerability world | freedom, bit, monthly, government, donation | 1 |
hesthervandoornum.nl | Particularly women and their expressions are key elements in my paintings. Their open attitude radiate vulnerability as well as their strength. This is enhanced by their transparency; the characters flow as it were, into the background… | attitude vulnerability, vulnerability strength | commission, painting, woman, biography, portrait | 1 |
veloct.nl | As organizations expand their use of technology, data vulnerability increases. By relying on our dedicated security engineers, who continuously stay up-to-date with the latest security issues, our clients have systems and policies in… | data vulnerability, vulnerability security | virtualization, computing, naar, securely, infrastructure | 1 |
maartenmourik.nl | …the potential for human goodness that it probes. Maarten Mourik captures the charms of childhood innocence and vulnerability, made all the more poignant by the undertow of darkness and violence that, in the end, will thwart the unfolding | innocence vulnerability, vulnerability poignant | colour, run, father, boy, friendship | 1 |
widscan.nl | Important announcements, releases, security vulnerability notifications. (Low volume). | security vulnerability, vulnerability notification | tomcat, documentation, configuration, release, apache | 1 |
feelandcarebeautyshop.nl | …foreknowledge of a beginning swain, and the titillation of discovering stock interests and shared values. It is a time of vulnerability and self-discovery as individuals open themselves up to the potentiality of rapture and companionship. | time vulnerability, vulnerability self | kawaii, feel, playful, whimsical, sweet | 1 |
eburon.nl | …and grief. Highlighting the importance of existential perspectives, this must-read for professionals bridges the gap between mental vulnerability and spiritual care, offering innovative insights for both theory and practice. Read… | mental vulnerability, vulnerability spiritual | publisher, academic, society, publish, publication | 1 |
mauritsvandergoes.nl | …League matches, I decided to test the security of this ticket shop. With success, I was able to buy more tickets than allowed. A security risk analysis of the vulnerabilities that is relevant in the design of various cloud architectures. | analysis vulnerability, vulnerability relevant | der, azure, databricks, summit, python | 1 |
powercloud.nl | …powered by artificial intelligence and machine learning. This allows us to keep our security threat data updated and pushed down to your networks in real time, so you’re always protected from zero-day attacks and new vulnerabilities. | | report, powerful, pricing, elastic, optimization | 1 |
liegendepinguins.nl | options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') | heartbeat vulnerability, vulnerability cve-2014 | uncategorized, heartbeat, gpg, payment, vulnerable | 1 |
europoortinternational.nl | …recent years he became involved in several national ministries and has become a mentor and inspiration for many leaders in our country. Jan is a powerful speaker who touches your heart time and again by speaking from his own vulnerability. | | church, conference, kingdom, ministry, shine | 1 |
blue21.nl | …was designed with a target retail value of approximately €9,000. The aim of this initiative was to reduce the vulnerability of urban poor communities that live in flood prone areas by introducing low-cost floating housing schemes. Much… | initiative vulnerability, vulnerability urban | urban, climate, wave, october, present | 1 |
gracemediation.nl | Should I be of service, these are my personal values: reliability, vulnerability, freedom, celebrating (life), and courage. You will certainly notice them in your contact with me. | reliability vulnerability, vulnerability freedom | grace, stakeholder, documentation, strength, difficult | 1 |
csirtdsp.nl | …and advise to digital service providers. Besides that, the CSIRT-DSP takes care to share current threats and vulnerability information with her constituency. The CSIRT-DSP is working with digital service providers to make the… | threat vulnerability, vulnerability information | report, duty, infrastructure, authority, click | 1 |
noordbeek.nl | Noordbeek assists you to identify vulnerabilities in information security and privacy protection, assess the risks and mitigate them. | noordbeek vulnerability, vulnerability information | protection, certification, certificate, assessment, annual | 1 |
palmyrabakker.nl | During the training I was able to explore my own personal loss, the unexpected death of my partner, the divorce of my parents, relocating and working abroad, burn-out, my mothers dementia and the eventual loss of both parents. I realised… | parent vulnerability, vulnerability tough | feeling, session, highly, therapy, puncture | 1 |
kenniscentrumphrenos.nl | …the experience of (serious) mental problems. One gets over the miserable consequences of having mental health problems, and rediscovers the (lost) potential to lead a fulfilled life, with or without the mental health vulnerability. | | mental, severe, illness, recovery | 1 |
psd2meniet.nl | Have you found a vulnerability in our project or website? Please report it here how to report this. | | risk, payment, api, background, permission | 1 |
verdus.nl | ExploRail | ProRail, Technology Foundation STW and the NWO Division for the Social Sciences have joined forces to reduce the vulnerability of the extremely busy Dutch railway infrastructure to disruptions. How can we localise problems in… | force vulnerability, vulnerability extremely | urban, programme, region, nwo, researcher | 1 |
loods2020.nl | …of a in the first place date, and the thrill of discovering stock interests and shared values. It is a ease of vulnerability and self-discovery as individuals public themselves up to the potentiality of inclination and companionship. | ease vulnerability, vulnerability self | kawaii, playful, lovable, whimsical, sofa | 1 |
massageentherapieindelft.nl | …what happens in the emotional body and helping us to park away the excess experiences and processes. This is the beginning of blockages in the body that again leads to malfunction, organs toxicity, poor sleep, virus vulnerability etc. | virus vulnerability, vulnerability etc | universe, treatment, session, towel, happiness | 1 |
ftcz.nl | In particular, to learn how to do all of the above in safe, boundaried environments that respect the privacy and vulnerability of much of childhood and adolescent experience | privacy vulnerability, vulnerability childhood | visitor, sense, voor, feel, competence | 1 |
duthler.nl | Organizing risk and compliance management are an extension of each other. The aim of risk management is to identify and identify vulnerabilities in the organization of business activities that threaten business continuity. We then advise… | management vulnerability, vulnerability organization, continuity vulnerability, vulnerability appropriate | operation, risk, associate, compliance, law | 1 |
net-force.nl | A new found vulnerability within glibc allows remote code execution by means of a heap-based buffer overflow. | new vulnerability, vulnerability glibc | add, puzzle, hacking, cook, electronic | 1 |
dewaterwerkers.nl | …and Flood Risk Management. This PhD amongst others presents a novel risk assessment framework which better integrates social vulnerability and equity, and therewith stimulates the development of socially inclusive (flood) risk management. | social vulnerability, vulnerability equity | risk, analysis, benefit, welfare, flood | 1 |
hapsite.nl | The Ten scales are: Socially avoidant behavior, Uncertain behavior, Vulnerability in interpersonal relationships, Somatizing behavior, Disorderly behavior, Rigid behavior, Perfectionist behavior, Antagonistic behavior, Self-satisfied… | behavior vulnerability, vulnerability interpersonal | personality, questionnaire, assessment, elderly, scale | 1 |
emocare.nl | “When we build a shell and hide inside it to cover up our vulnerability, so that we’re not open to hurt and fear, we also become insensitive to joy, love, happiness and aliveness” | inside vulnerability, vulnerability open | embody, affective, relational, therapy, integral | 1 |
oomkens-consultancy.nl | I am a trained climate change adaptation specialist in environmental science and an expert in identifying strategic opportunities. My principal areas of technical expertise include climate science (impacts, risks, vulnerability… | risk vulnerability, vulnerability adaptation | climate, february, august, risk, analysis | 1 |
crisisplan.nl | We do applied research into crisis vulnerabilities, causes of crises, and crisis management performance. | crisis vulnerability, vulnerability cause | strategic, publication, stamina, overview, reference | 1 |
idiotz.nl | Oh yeah, after a silent retreat of about 4 months, I was super hungry for new knowledge, and couldn’t resist to dive into the world of internet security. I got myself up to par with the current state of affairs with regards to… | regard vulnerability, vulnerability exploit, start vulnerability, vulnerability place | programming, shortcut, guest, lock, finally | 1 |
wilddna.nl | I believe that, now more than ever, it is important to discuss the essence and also the vulnerability of nature. That is why I love telling about my field of study, about what we can learn from animals and the wilderness. Curious? Contact… | essence vulnerability, vulnerability nature | animal, publication, evolution, pygmy, turtle | 1 |
ahbkunst.nl | I derive the inspiration for my drawings from that point in time at which beauty and vulnerability converge. It is this particular combination that I find so exciting and so appealing. | beauty vulnerability, vulnerability particular | sculpture, exhibition, artwork, drawing, carefully | 1 |
avilius.nl | Personalized consulting can help customers improve their security posture by identifying and addressing vulnerabilities in their IT systems. | address vulnerability, vulnerability system | consulting, architecture, productivity, strategic, create | 1 |
paulzonneveld.nl | This is why we have chosen to build all programs from the inside-out. Inside-out creates self-awareness and helps to change restrictive mindsets. We work on internal entanglements that keep us trapped, provide insight into blind spots and… | spot vulnerability, vulnerability opportunity | leadership, executive, potential, philosophy, connection | 1 |
icpe.nl | HowNutsAreTheDutch aims to create an empirically based representation of mental strengths and vulnerabilities,. | | emotion, psychopathology, regulation, interdisciplinary, study | 1 |
onk.nl | Their intimacy and vulnerability thrive with the exclusive attention they receive at a specialized art fair. Art fairs that are focused on one particular medium such as paper, are appreciated globally by many galleries and a mainly… | intimacy vulnerability, vulnerability exclusive | enterprise, exhibition, publication, catalog, paper | 1 |
bendercoaching.nl | I learned to get in better touch with my own strength and vulnerability, and to react from there. I am more autonomous and connected now, both personally and professionally. | strength vulnerability, vulnerability autonomous | executive, psychology, situation, voor, leadership | 1 |
alkebulan.nl | …meet at the intersection of change. Amplifying the unheard, broadcasting the untold stories, creating space for vulnerability, and owning sexuality with titles like IK HOOP, War Against Racism, Vrouwentoilet, and more. Bring your voice to | space vulnerability, vulnerability sexuality | nation, cultural, generation, ago, racism | 1 |
geoit.nl | stakeholders (NGO’s, Governements) in the event of disaster. The dashboard visualizes geographic data of flood extents and vulnerability indicators (such as populations density, land used) on a webmap. In this project I was responsible for: | extent vulnerability, vulnerability indicator | python, programming, spatial, cross, responsible | 1 |
oligoscan.nl | Therefore, a deficiency in trace elements and minerals is one of the major factor for poor performance, tiredness, vulnerability to stress, decreased concentration or intellectual capacity, etc. It is, therefore, important to control the… | tiredness vulnerability, vulnerability stress | mineral, toxic, metal, oxidative, role | 1 |
studioflorentijn.nl | The Mona Lisa project is more than a collection of paintings. It is a source of inspiration, an invitation to reflect on our own journey through life. The artist shares her vulnerability, her strength and her unique perspective with the… | artist vulnerability, vulnerability strength | magic, exhibition, pattern, pain, soul | 1 |
stanhegt.nl | …Tegenlicht and KRO Brandpunt. Moreover, Stan has published numerous security advisories on specific software vulnerabilities and security testing methodologies. He has supervised various academic research projects on security topics… | software vulnerability, vulnerability security | attack, penetration, threat, engagement, decade | 1 |
payodhi.nl | …strength of the mature person you are now. You return to the present, but more aware, lighter, and with the feeling of being reborn. You will have more confidence, more life energy and strength, and more compassion for your vulnerability. | | inn, relationship, therapy, inside, feeling | 1 |
tarotwithme.nl | …of a basic date, and the give someone a kick of discovering stale interests and shared values. It is a time of vulnerability and self-discovery as individuals unreserved themselves up to the plausibility of inclination and companionship. | time vulnerability, vulnerability self | kawaii, playful, whimsical, darknet, investment | 1 |
qitee.nl | Our experts can identify vulnerabilities, assess risks, and implement robust security measures to safeguard your systems and data. | expert vulnerability, vulnerability assess | consulting, manage, advisory, consultation, healthcare | 1 |
laviepsychologie.nl | …acceptance and respect. Therapy is one of the most personal experiences you can have. I do not take the vulnerabilities you have lightly as you reflect on yourself and the hopes you have. My work is heart centered an focused on… | experience vulnerability, vulnerability lightly | session, psychology, therapy, foreign, expat | 1 |
by-zooi.nl | Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server. | team vulnerability, vulnerability site, able vulnerability, vulnerability able | discount, prescription, buy, wat, limited | 1 |
soulfultherapy.nl | For many years midwifery has been Sarah’s work of passion to be with women during one of the biggest changes in their lives. She witnesses vulnerability, and experiences the power it holds when we can truly surrender to it, the strength… | life vulnerability, vulnerability power | soulful, therapy, meditation, soul, whisper | 1 |
milano-s.nl | …of a in the first place swain, and the quivering of discovering garden interests and shared values. It is a continually of vulnerability and self-discovery as individuals open themselves up to the plausibility of love and companionship. | continually vulnerability, vulnerability self | kawaii, playful, whimsical, charming, bow | 1 |
adrianamast.nl | …moments in private situations make the transition to the painting.. The painting that she makes are the result of a sharp observation and show the vulnerability of existence. Adriana’s painting are being sold in the Netherlands and abroad. | observation vulnerability, vulnerability existence | painting, portrait, sleep, animal, landscape | 1 |
nhstudio.nl | In her fine art work she tries to convey a quiet stillness, a blend of nostalgia and vulnerability combined with geometry and minimalism. In the chaos off life she tries to quiet it down to a single point of interest, whether by the… | nostalgia vulnerability, vulnerability geometry | mother, antique, jewellery, father, stillness | 1 |
womb-project.nl | Our writers share their own experiences, vulnerability, and wisdom, creating a tapestry of empathy that invites you to explore the intricate threads of the human experience. Join our community where compassion knows no bounds, and… | experience vulnerability, vulnerability wisdom | aenean, morning, road, uncategorized, earth | 1 |
thokaverhuur.nl | Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server. | team vulnerability, vulnerability site, able vulnerability, vulnerability able | almond, regard, monkey, kunnen, surge | 1 |
denniskolen.nl | Love Hope Faith is a new chapter in Dennis Kolen’s musical diary. The lyrics still address the age-old topics of doubt and vulnerability, but the whole tone of the album strikes a more positive note. Hope springs eternal in these very… | doubt vulnerability, vulnerability tone | song, singer, hope, revolution, muddy | 1 |
yougym.nl | …capabilities. Are you moving enough or is there room for improvement? Are there any signs of weakness or vulnerability in movement patterns or even certain injuries that keep playing up? With this knowledge, we can find a movement… | weakness vulnerability, vulnerability movement | healthy, assistance, habit, movement, nutrition | 1 |
ronaxt.nl | …of a in the first place fixture, and the thrill of discovering stale interests and shared values. It is a time of vulnerability and self-discovery as individuals public themselves up to the plausibility of regard and companionship. | time vulnerability, vulnerability self | connection, discovery, commerce, etc, odd | 1 |
verifysecurity.nl | Verify Security specializes in detecting vulnerabilities in networks and web applications. | security vulnerability, vulnerability network | verify, penetration, infrastructure, finding, contractor | 1 |
jurcom.nl | The extensive risk assessment service provided by Jurcom involves a systematic evaluation of an organization’s potential vulnerabilities and threats, aiming to identify, analyze, and prioritize risks. We are here to help you implement… | potential vulnerability, vulnerability threat | compliance, directive, risk, gdpr, regulation | 1 |
excelitservices.nl | “Hacking anything to secure everything.” We believe in harnessing the power of technology to safeguard every aspect of your business and personal life. From identifying vulnerabilities in your digital infrastructure to implementing robust… | life vulnerability, vulnerability digital | sit, dolor, lorem, amet, ipsum | 1 |
generit.nl | Tightening the security is one of the most concerning topics among IT infrastructures. Using the latest encryption standards, getting rid of vulnerabilities and protecting your inner network from the outside by defining a DMZ is crucial… | getting vulnerability, vulnerability inn | infrastructure, electric, supply, aviation, urban | 1 |
karinstroo.nl | Titles of projects: ‘playing around in love’, ‘be quiet’, ‘the great women master piece’, ‘male nudity and other vulnerabilities’, ‘back’, ‘care for me’, ‘for all we know’, ‘ for all we (don’t) know’, ‘what about the suffering’ and ‘for… | nudity vulnerability, vulnerability suffer | conversation, drawing, soul, installation, sculpture | 1 |
dutchcloudcommunity.nl | A sobering thought, given cyber attacks have been occurring every 39 seconds and, on average, 2,244 times a day (Varoni 2020) and that the vulnerability of SME’s from cyber breaches is growing annually at greater than 400%. Conversely… | varoni vulnerability, vulnerability sme | enterprise, gap, sme, ethical, recipient | 1 |
it-takestwo.nl | Practice new ways of responding and interacting. Showing vulnerability in order to receive sincere acceptance and appreciation.. | way vulnerability, vulnerability order | couple, therapy, therapist, relationship, desire | 1 |
openupconnect.nl | The project is about understanding religion in the lives of young people, understanding the process of growth and development of young adolescents and their strengths and vulnerability. It also offers strategies to deal with the risk… | strength vulnerability, vulnerability strategy | dialogue, conference, youth, neighborhood, religion | 1 |
beautieqristieq.nl | In the duchy of dating, whole encounters a different range of emotions. There's the exhilaration of meeting someone trendy, the foreknowledge of a beginning date, and the quivering of discovering stock interests and shared values. It is a… | stretch vulnerability, vulnerability self | kawaii, playful, whimsical, charming, bow | 1 |
blackrivertech.nl | Mostly used as a fast scripting language to help with tedious manual tasks. For example: Quickly indexing & scanning entire codebases & live infrastructure for Log4J vulnerability in 2021 | | scalable, microservice, arduino, achievement, infrastructure | 1 |
leadershipsolutions.nl | “Dare to be vulnerable and you will find inner strength. Our personal approach is based on trust and vulnerability. Don’t take yourself for granted and give yourself the chance to explore your potential.’ | trust vulnerability, vulnerability chance | leadership, leader, programme, growth, employee | 1 |
wildfrontiers.nl | Hans Wolkers regularly visits the world’s last remaining wild places. His aim: to document the beauty, diversity, and vulnerability of our planet. | diversity vulnerability, vulnerability planet | south, georgia, namibia, coast, bird | 1 |
securify.nl | …Knowing your business best, we will create a prevention roadmap together. Time is money, so we focus on what really matters for your business: exposing vulnerabilities and showing relevant abuse scenarios and other points for improvement. | business vulnerability, vulnerability relevant | pentesting, resilience, prevention, risk, progress | 1 |
gripconsultancy.nl | …Security policy according to ISO 27001 will help making your organisation aware of the security threats and vulnerabilities and to take adequate controls to limit the likelihood and impact of information security incidents. GRiP can… | threat vulnerability, vulnerability adequate | risk, request, operational, enterprise, intelligence | 1 |
project-theseus.nl | The central objective of the THESEUS project is to empower organizations to patch security vulnerabilities much faster, more efficiently and with less risk. | security vulnerability, vulnerability fast | webpage, publication, objective, risk, central | 1 |
inception.nl | Our system gives you insight into all the opportunities and risks of your organization. Vulnerabilities come to light and follow-up and improvement is automatic. | organization vulnerability, vulnerability light | risk, improvement, assessment, certification, compliance | 1 |
kikasprangers.nl | …she wants to capture the deep serenity that characterises the heart of her music. Her method is about fusing vulnerability with strength expressing itself in a predilection for both unorthodox line-ups and impactful artistic choices… | method vulnerability, vulnerability strength | composer, saxophonist, leader, musician, listener | 1 |
mlbg.nl | Our experts can identify vulnerabilities, assess risks, and implement robust security measures to safeguard your systems and data. | expert vulnerability, vulnerability assess | career, certification, partners, consulting, efficiency | 1 |
intimacyopdeschans.nl | US Intimacy op de Schans is an unconventional series of four exhibitions of lens-based work, presented in a creative youth home in Amsterdam, that reflect on themes of intimacy, vulnerability and gender identity in North American (visual)… | intimacy vulnerability, vulnerability gender | intimacy, op, american, north, oct | 1 |
dik-takken.nl | Vulnerability scanners like OpenVAS are an integral part of many security monitoring operations. OpenVAS produces reports that contain a ton of precious information about a networking environment. In fact, if you use OpenVAS you probably… | | mining, runtime, contribution, template, artificial | 1 |
wietzebeukema.nl | For red teamers, this project can help identify DLLs that can be used to achieve DLL Hijacking. The aim of this project is not to make it easy to abuse the recorded vulnerabilities; as such, PoCs, code templates or tuturials are not… | easy vulnerability, vulnerability poc | july, dll, paper, august, january | 1 |
kikipetratou.nl | subjects who are oblivious to an outside gaze, Petratou's are engaged with the viewer. There is a strange mix of vulnerability and empowerment as the subject's confront the viewer as we intrude into an intensely personal space. This… | mix vulnerability, vulnerability empowerment | exhibition, opposite, attraction, installation, greece | 1 |
aykevl.nl | How do you embed JSON in JavaScript? The naive approach turns out to have a XSS and DoS vulnerability, but this is easily fixed with a simple filter. | dos vulnerability, vulnerability easily | debian, authentication, pill, firmware, replica | 1 |
johnappel.nl | About directing: ‘I make films on the basis of a combination of thorough research and intuition. During my research I’m not just looking for facts, but above all for the vulnerability of people. I call this ‘emotional research.' | fact vulnerability, vulnerability people | documentary, idfa, major, numerous, portrait | 1 |
homobulla.nl | and drifting passively, driven by draught or wind. You sail along on the air streams, together with your companions and relatives, experiencing your own vulnerability and that of your beloved ones nearby. Knowing it will all come to an end. | relative vulnerability, vulnerability beloved | triptych, bubble, satellite, inquiry, soap | 1 |
giovane-moura.nl | Giovane C. M. Moura, Sebastian Castro, John Heidemann and Wes Hardaker. TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS . Proceedings of the ACM Internet Measurement Conference ( IMC2021 ) .Virtual, Nov. 2021. [PDF] | misconfiguration vulnerability, vulnerability ddos | measurement, proceedings, conference, anycast, passive | 1 |
art-from-earth.nl | These photographs do not show how beautiful and large a country is, but present what a work of Art lies hidden in that huge thick layer of satellite imagery that surrounds us. And at the same time they show Earths vulnerability and make… | earth vulnerability, vulnerability aware | earth, photograph, vulnerable, wonderful, monochrome | 1 |
tankstationenschede.nl | …of fashion, nature, and people. Meanwhile, Celine Micheli, a transdisciplinary queer non-binary artist from Italy, delves into performance, sound, and visual arts, addressing themes of intersectional feminism, vulnerability, and intimacy. | feminism vulnerability, vulnerability intimacy | reservation, dinner, plate, allergy, diet | 1 |
itsaboutlove.nl | We work with your unique roots, vulnerability, love relationships and life itself. | root vulnerability, vulnerability love | integration, session, pelvic, bodywork, intimacy | 1 |
yogashala.nl | …for groups and private classes. Experience gathered over many years has helped crystallize her perception and approach of someone’s reality and need. Anke meets people with love and compassion, seeing their strength and vulnerability. | | hague, authentic, loud, weekly, schedule | 1 |
wendyriksen.nl | Wendy is a training actor who likes to immerse herself in the matter which makes her connect even better with the participants. But even better are her sincerity and her vulnerability. By sharing something personal once in a while. It… | sincerity vulnerability, vulnerability personal | actor, reference, role, quickly, behavior | 1 |
barberkingputten.nl | …of a basic swain, and the give someone a kick of discovering common interests and shared values. It is a stretch of vulnerability and self-discovery as individuals unreserved themselves up to the possibility of rapture and companionship. | stretch vulnerability, vulnerability self | ed, pill, channel, darknet, pack | 1 |
sabinevandenbulk.nl | Watch and experience a baby … watch and experience someone who is very sick, almost dying, or almost died … the vulnerability of human beings is expressed in a near-death experience (NDE), such as that of a newborn baby. | sick vulnerability, vulnerability human | death, near, therapist, healthcare, strawberry | 1 |
aquaticecology.nl | …in the thermal physiology of aquatic invertebrates. I am interested if and how differences in a species’ thermal vulnerability can be predicted from their morphological and physiological traits that are related to oxygen supply and demand. | thermal vulnerability, vulnerability morphological | aquatic, interest, publication, animation, species | 1 |
bram-coppens.nl | …noxious, she describes the following four parameters. Extreme harms for individuals , Extreme harm on society, Vulnerability and Weak Agency . My claim is that the parameter of weak agency has limited applicability because the scope is… | society vulnerability, vulnerability weak | truth, think, society, fact, critique | 1 |
hendrikkerstens.nl | …the day. having a child left a deep impression on kerstens. through photography, he explored the accompanying feelings of responsibility, vulnerability and love he felt towards his daughter, starting with documentary family snapshots. | responsibility vulnerability, vulnerability love | portrait, cover, london, contemporary, paris | 1 |
beedirect.nl | At present, an overwhelming proportion of businesses are placing their sensitive data in the hands of third-party cloud tools that are plagued by a multitude of vulnerabilities. | | loyalty, wholesaler, introduction, supplier, risk | 1 |
jasperschulte.nl | I try to work for a team as a leader instead of as a boss. Standing next to your team, maximizing their potential, not being afraid to reveal your own vulnerability and always steering towards an ideal situation where your role is no… | afraid vulnerability, vulnerability ideal | role, ambition, stack, responsible, speak | 1 |
simplifaai.nl | Out-of-bounds: an outside view of computer memory vulnerabilities π¬π§ Β / π³π± | | initiative, fighter, somewhat, grandma, researcher | 1 |
jolienspoelstra.nl | …to tell your partner what is causing the pain you’re experiencing and what you would like to do differently, the other person can help you out. To get to this point both partners must be willing to open up and show their vulnerabilities. | | treatment, therapy, session, therapist, emotion | 1 |
mrcit.nl | …with Microsoft (lowering costs), onboarding of new production location into Centrient IT Infrastructure, developing and implementing a new workplace booking app, selected and implementing a new VMS (Vulnerability Management System). | vms vulnerability, vulnerability management | infrastructure, pharmaceutical, july, migration, workplace | 1 |
treehousetribe.nl | Kai is on a mission to bring more kindness, vulnerability & play to the world of business. | kindness vulnerability, vulnerability play | treehouse, founder, kindness, entrepreneur, victory | 1 |
ptlifecoaching.nl | Vulnerability is often a plunge some are not yet brave enough to take, but a minute discomfort is no reason to stifle such an elation; an opportunity to obtain an exhilarating balance of chaos and calm that shakes up and soundly adjusts… | confidence vulnerability, vulnerability ear | princess, stat, imagery, exchange, collaborator | 1 |
nowastenetwork.nl | Today it's World Earth Day. And it may be more of a relevant topic than ever. In the current times, where the vulnerability of people and the planet is extra visible. That is why it is important today to pay extra attention to how… | time vulnerability, vulnerability people | waste, planet, pumpkin, united, nation | 1 |
merwedegijzelaars.nl | The cutaway figure represents the loss and change the men have undergone. It also indicates vulnerability, standing on one leg with the inside unprotected. This shiny interior of the statue represents the innocence of the men who have… | man vulnerability, vulnerability leg | description, crazy, germans, resistance, statue | 1 |
carolinekampfraath.nl | One of the central themes in Caroline’s work is the difference between expectations and reality. In daily life, people have great expectations. Everyday, careless objects such as bottles and tables represent the vulnerability and… | table vulnerability, vulnerability insignificance | sculptor, contemporary, exhibition, venice, biennale | 1 |
the-secret-bar.nl | …go for the project, and Gert promised that the interesting opportunity would also be paid off to the staff. That open attitude and showing vulnerability motivated us. This was, of course, the intention, but the way in which was done well. | attitude vulnerability, vulnerability course | january, later, graphic, hague, wine | 1 |
caradt.nl | ‘It is through the “not-knowing” that a stimulating and caring environment can be created to confidently share vulnerability.’ | | cultural, society, interaction, apply, risk | 1 |
koenbrinkgreve.nl | “I experience Koen as stimulating, challenging and trusted. He brings a nice combination of taking you out of your comfort zone and being with the aftereffect with softness. I hear a lot of people talking about courage and vulnerability… | courage vulnerability, vulnerability truly | mask, mentorship, leader, leadership, calendar | 1 |
3pd.nl | …into ambitions and result-oriented action. Daan creates the safe atmosphere that is essential for commitment, vulnerability and transition. Daan has a background in (Sales) management and is trained as a (training) actor, coach and in… | commitment vulnerability, vulnerability transition | leadership, programme, executive, ability, motivation | 1 |
la-consultancy.nl | Governance, Risk Management, Policies, Vulnerability management, Security hardening, Assurance, and so on.. - L.A. Consultancy leads the development of the Information Security organization by understanding the business and taking a… | policy vulnerability, vulnerability management | responsibility, awareness, auditing, employee, stakeholder | 1 |
ictwise.nl | This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes… | security vulnerability, vulnerability course | azure, exam, instructor, click, administrator | 1 |
serton.nl | Serton’s works are a dialogue, an exploration of how nature adapts and resists in a world increasingly shaped by human hands. She brings a message of both vulnerability and strength, inviting the viewer to reflect on our role in and… | message vulnerability, vulnerability strength | visual, paper, viewer, interaction, role | 1 |
passgenerator.nl | …less likely to be found in such tables, protecting your account from attacks that use these tables. 6. Reducing Vulnerability to Credential Stuffing: With the prevalence of data breaches, hackers often use compromised passwords to gain… | table vulnerability, vulnerability credential | unauthorized, attack, encode, complexity, threat | 1 |
blokss.nl | These questions however, are the main key to successful change. In order for such change to take effective place, the management of an organization has to be willing to show its vulnerabilities; in practice, this is hardly ever what… | willing vulnerability, vulnerability practice | operational, optimization, workplace, maintenance, employee | 1 |
yogariska.nl | During a Yin yoga session you are invited to turn inward and take a closer look at yourself. For example, you look at deeper sensations and feelings that may have been hidden for a long time. It takes courage and vulnerability to… | courage vulnerability, vulnerability process | lesson, exercise, posture, meditation, breathe | 1 |
ilovelittlethings.nl | foreknowledge of a first date, and the give someone a kick of discovering stock interests and shared values. It is a time of vulnerability and self-discovery as individuals open themselves up to the feasibility of rapture and companionship. | time vulnerability, vulnerability self | ago, kawaii, proxy, limit, investment | 1 |
botanique-art.nl | My artworks are powerful and investigative, sometimes impulsive, but at the same time they radiate modesty and vulnerability. The cycles of the seasons, the transience and imperfection of nature are themes that are close to my heart and… | modesty vulnerability, vulnerability cycle | organic, harmony, perspective, aesthetic, authentic | 1 |
nipac-lumc.nl | Seeing without touching; non-invasive imaging of atherosclerotic lesion vulnerability | | analysis, invasive, disease, cardiovascular, publication | 1 |
broedplaatsbouw.nl | Gus Møystad is an illustrator, comics artist, and writer whose work explores themes of vulnerability, liminality and belonging. His ar | theme vulnerability, vulnerability liminality | zine, sky, exhibition, artistic, sun | 1 |
connectedtouch.nl | …on creating a safe and pleasant space to be in. This I will do with my experience and openness and also my vulnerability. I will invite you in that space and will encourage you to also open your heart. I am very open to whatever may… | openness vulnerability, vulnerability space | tantric, connect, erotic, sensual, conduct | 1 |
ontsnaptaandedood.nl | In the empire of dating, whole encounters a dissimilar kind of emotions. There's the exhilaration of convention someone trendy, the anticipation of a beginning swain, and the quivering of discovering stock interests and shared values. It… | time vulnerability, vulnerability self | kawaii, connection, lovable, darknet, relationship | 1 |
robhabraken.nl | I just released a new version of my Focal point cropping module for Sitecore Content Hub. It is tested with the latest version of Content Hub (which is now on auto-update), has a small new feature, and most importantly, I got rid of all… | got vulnerability, vulnerability outdated | sitecore, crop, focal, february, azure | 1 |
virtualcoffee.nl | The book emphasises moving beyond transactional interactions and embracing vulnerability and authenticity. It encourages readers to delve deeper into conversations, fostering personal growth and empathy through a better understanding of… | interaction vulnerability, vulnerability authenticity | connection, psychological, collaboration, conversation, physical | 1 |
onlinesalespecialist.nl | Defend your websites against attacks and malware by detecting and fixing vulnerabilities. | | monthly, visit, domain, fact, traffic | 1 |
damsteen.nl | device cannot be accessed locally. For this reason, it has no business being on my network other than to use my internet connection. So, to protect my network from any possible vulnerabilities we can use virtual LANS - VLANs. Let’s see how! | possible vulnerability, vulnerability virtual | creality, firmware, extruder, blogging, connection | 1 |
johnspek.nl | …And yet his creations look so flawless and a matter of course , thanks to John’s many years of experience and his ever-growing awareness of both the vulnerability and the hardness of his material. Metal has become part of John himself. | awareness vulnerability, vulnerability hardness | sculpture, stainless, bronze, steel, metal | 1 |
2protect.nl | Mitigate risks to your valuable assets. We assess threats, vulnerabilities, and work closely with stakeholders to prioritize risks. Develop and implement effective strategies for risk reduction and data protection to help you reduce your… | threat vulnerability, vulnerability closely | consulting, risk, trust, compliance, commitment | 1 |
charlottedumas.nl | The multidisciplinary work The Horse in the Gourd centres on the basic elements of life, its vulnerability and resilience. Using five peculiar objects that bring myth, imagination and the transient nature of life together. | life vulnerability, vulnerability resilience | horse, island, girl, stay, hole | 1 |
irenedrexhage.nl | I like to guide women's circles because there is something special about being together only with women, especially when space is genuineness, vulnerability, craziness, love and uniqueness. At this moment the circle's are in Dutch… | genuineness vulnerability, vulnerability craziness | bodywork, woman, circle, connection, pain | 1 |
studiogeorge.nl | The experience is engaging, full of information and very reflective. It's also an intense training on empathy and vulnerability, in a good way. | empathy vulnerability, vulnerability good | lesson, conversation, fullsize, entrepreneur, oct | 1 |
timtrinh.nl | …portraits, he discovered the realm of boudoir photography. He became enamored with the passionate blend of vulnerability and confidence exuded by these individuals. His nuanced and dynamic works become journeys of empowerment… | blend vulnerability, vulnerability confidence | intriguing, collaborative, realm, sensual, endeavor | 1 |
thice.nl | We build and organize CTF (Capture The Flag) hacking competitions for educational, recruitment and training purposes. We can provide challenges in (but not limited to) web application security, network analysis, forensics, malware… | analysis vulnerability, vulnerability exploit | window, response, ctf, presentation, readiness | 1 |
aukezwaan.nl | …at the University of Amsterdam) and I did a security review of the Blackboard implementation at the University of Amsterdam. In a couple of days time in total, we managed to find several vulnerabilities in the system, which eventually… | total vulnerability, vulnerability system | ctf, write, stuff, interesting, educational | 1 |
ngosimba.nl | Environmental degradation increases the vulnerability of the societies it affects and contributes to the scarcity of resources. | degradation vulnerability, vulnerability society | wildlife, protection, environmental, animal, species | 1 |
merlebergers.nl | perceives tears in public settings. It is intriguing to observe how we sometimes feel discomfort or shame when confronted with displays of vulnerability, overlooking the fact that these emotions are an inherent part of our human experience. | display vulnerability, vulnerability fact | conceptual, scent, tear, archive, fragrance | 1 |
skylighthosting.nl | Automatically checks your applications to ensure they are up-to-date and secured against known vulnerabilities. | | skylight, ipsum, sit, amet, omnis | 1 |
lucettevandenberg.nl | Singing, she walks a path of love, sadness, hope, deceit, happiness and vulnerability. | | later, song, singer, composition, classical | 1 |
osintelink.nl | OSINTELINK PReVENT reports sentiments, threats and vulnerabilities before, during and after meetings, conferences and events. This method has proven to be very successful in detecting threats, determining the exact cause and nature of the… | threat vulnerability, vulnerability meeting | threat, awareness, situational, intelligence, publication | 1 |
jouwliedje.nl | of a in the first place swain, and the quivering of discovering stale interests and shared values. It is a stretch of vulnerability and self-discovery as individuals public themselves up to the plausibility of inclination and companionship. | stretch vulnerability, vulnerability self | investment, connection, relationship, trading, firm | 1 |
slowfeetstudio.nl | This insightful interview delves into the heart of expressive movements, advocating for dancers to embrace vulnerability and empowerment in their artistic journey. | dancer vulnerability, vulnerability empowerment | dance, lesson, wedding, shoe, dancer | 1 |
calmmama.nl | …changing journey. It's a journey full of love and empowerment, where you will learn just how strong and amazing you and your body are. But it's also a journey where you will often face your own vulnerabilities, possible fears and worries. | journey vulnerability, vulnerability possible | calm, childbirth, birth, educator, pregnancy | 1 |
vanmaastrichtlasservice.nl | …the foreknowledge of a first date, and the quivering of discovering stock interests and shared values. It is a ease of vulnerability and self-discovery as individuals open themselves up to the potentiality of love and companionship. | ease vulnerability, vulnerability self | kawaii, playful, whimsical, charming, bow | 1 |
julidans.nl | …the world we live in. The fact that this world is currently uncertain and shaky makes us more aware of our own vulnerability. It also forces us to reflect on how we treat each other and our environment. What does the future look like… | aware vulnerability, vulnerability environment | dance, davi, wallace, contemporary | 1 |
connectionlab.nl | I am an EFT Therapist and Coach, working based on the principles of connection; authenticity, vulnerability, curiosity and personal leadership. If you want to truly lead: in your life, and in your relationships, you have to know yourself… | authenticity vulnerability, vulnerability curiosity | couple, therapy, sensitive, connection, relationship | 1 |
sustainablesafety.nl | underlying risks of the entire traffic system. Human factors are the primary focus: by starting from the needs, competences, limitations and vulnerability of people, the traffic system can be realistically adapted to achieve maximum safety. | limitation vulnerability, vulnerability people | road, traffic, injury, systematically, report | 1 |
beeldendiespreken.nl | “Learning is nog saying enough about everything I learn and learned with Jos and Margareth. We have intense encounters about art as element of life and about the vulnerabilities and strenghts of creating and putting these creations into… | life vulnerability, vulnerability strenght | jou, voor, exhibition, contemporary, artwork | 1 |
eurosolarnl.nl | The Adaptation Sciences research program funded a project to assess vulnerability to sea level rise and implement feasible strategies … | project vulnerability, vulnerability sea | climate, section, renewable, association, ocean | 1 |
invulns.nl | It’s short for invulnerabilities, which are the opposite of vulnerabilities, so it’s quite a positive name :) In the header of this page you can see a fun | opposite vulnerability, vulnerability positive | ascii, interested, positive, profile, header | 1 |
rosakieft.nl | A series of four exhibitions with photography and video exploring intimacy, vulnerability and gender-neutrality in the USA. Located at Oudeschans 15 in Amsterdam with additional program of performances and music. Participating artists:… | intimacy vulnerability, vulnerability gender | exhibition, installation, writer, london, researcher | 1 |
vosart.nl | Paul builds on these sculptural laws and lets people in their pure form take center stage, thus expressing the vulnerability of the human being. Paul knows the essence of his work and sculpts energy, life energy in all its facets, the… | stage vulnerability, vulnerability human | sculpture, early, flower, movement, law | 1 |
elektrisch-ecosysteem.nl | …in a factual, anecdotal manner. It is an inspiring reality that calls for contemplation and dialogue about the vulnerability and natural balance of the ecosystem, in which everything appears to be interconnected and where even the… | dialogue vulnerability, vulnerability natural | electric, ecosystem, bacteria, animal, earth | 1 |
ateliervinkenoog.nl | …can be whomever they choose to be. There is no wrong about being a dominant competitor, a colorful bird or an empathetic homemaker. And being all of it. Show your muscles, publish your vulnerability, tell your courage and show your colors. | muscle vulnerability, vulnerability courage | tailor, wedding, identity, inspiration, clothing | 1 |
inside-outside-coaching.nl | …your unique talent (ever more expected in the work place) you are by definition more vulnerable. But that vulnerability increases the opportunity to connect in a real way with others. And those connections increase work satisfaction | vulnerable vulnerability, vulnerability opportunity | inside, retrospective, outside, methodology, effective | 1 |
thereflex.nl | By continuously developing it and releasing new updates, any security vulnerabilities and errors are removed from the framework and gets better and more secure. | security vulnerability, vulnerability error | webpage, promotion, cafe, connection, additional | 1 |
fpsecurity.nl | We evaluate your existing SAP Security framework and pinpoint its vulnerabilities. | | risk, architecture, authorization, implementation, career | 1 |
basaltaura.nl | Updated all Python requirements so using latest safe modules to reduce vulnerability (thanks Snyk ). | module vulnerability, vulnerability thank | ascii, geospatial, representation, calculation, landscape | 1 |
lidievoorend.nl | The vulnerabilities in life touch me equally. For those who are oppressed and lack freedom, I open my heart. Through my work with Médecins Sans Frontières and in district nursing, I have experienced a lot of misery up close: hunger, pain… | | woman, grateful, animal, freedom, portrait | 1 |
magicwitchin.nl | …the first place swain, and the give someone a kick of discovering common interests and shared values. It is a time of vulnerability and self-discovery as individuals open themselves up to the potentiality of inclination and companionship. | time vulnerability, vulnerability self | magic, witch, camp, kawaii, magical | 1 |
rleventtechniek.nl | Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server. | team vulnerability, vulnerability site, able vulnerability, vulnerability able | entire, credentials, automatically, payment, leak | 1 |
bitpatroon.nl | Experience comprehensive security services encompassing scans, analysis, inspections, prevention, and thorough investigations. At Bitpatroon, we prioritize safeguarding your digital environment. Our expert team meticulously scans and… | meticulously vulnerability, vulnerability thorough | landscape, api, realm, cohesive, integration | 1 |
leventbedrijfsrecherche.nl | We understand that every situation is different. That’s why we work with you to identify the vulnerabilities of your organization and which solutions best fit your needs. In this way, we deliver the tailored service that your organization… | different vulnerability, vulnerability organization | risk, investigation, employment, integrity, employee | 1 |
feax.nl | A write-up of CVE-2021-36782. This vulnerability exposes Rancher's kontainer-engine's ServiceAccountToken, which can be used for privilege escalation. | cve-2021 vulnerability, vulnerability rancher | min, terraform, rancher, interesting, aws | 1 |
joostdebie.nl | What the eye sees is reproduced as direct as possible. Moreover the work is characterized for its attention to details. Wherein; softness, tenderness and vulnerability are the core values in my work | tenderness vulnerability, vulnerability core | landscape, flower, paint, oil, nude | 1 |
skosh.nl | vulnerability and denial can cause an explosive situation. In the regional approach, we want to raise attention for these groups and see if we can pilot interventions in the region that can reach them. The first step is to know more about… | | region, donation, society, intervention, report | 1 |
eleye.nl | An autobiography based artistic practice on vulnerability of relationships and memories by Eleye Boerenkamps showing her own body, family of origin, current and past homes and some other personal narratives. | practice vulnerability, vulnerability relationship | exhibition, wood, cargo, table, past | 1 |
stress-nl.nl | The Ron de Kloet award for Stress Research is given to an international researcher who has made outstanding contributions to our understanding of stress in adaptation, resilience and vulnerability for disease. Recipients can be either… | resilience vulnerability, vulnerability disease | researcher, institute, force, neuroscience, annual | 1 |
4dlean.nl | 4D Lean also means: “organization from the heart”. We try to make people and organizations evolve into better versions of themselves step by step. We do this with a people-focused, respectful approach with an eye for passion, talent… | autonomy vulnerability, vulnerability mean | balance, consulting, happiness, philosophy, registration | 1 |
wordclouds.nl | To open your heart To trust To let go Without a safety plan No guarantees Full vulnerability To have faith To be open To disregard The pull of doubt Fear Insecurities To surrender Completely And fully To what is Now Here Present To detach… | guarantee vulnerability, vulnerability faith | urge, desire, revelation, poetry, dark | 1 |
mkvertalingen.nl | If the corona crisis has highlighted one issue, it is the vulnerability of the international production chain. | issue vulnerability, vulnerability international | translation, request, reference, manual, reliable | 1 |
frankrenssen.nl | I focus into four topics in particular. Flowers because of their unique combination of strength and vulnerability. Trees being the earth's largest and oldest living organisms. Sea because of its formidable force and ever changing color… | strength vulnerability, vulnerability tree | painting, sculpture, wood, flower, tree | 1 |
abroorda.nl | The guiding motive, which runs as a thread through my entire oeuvre, is the vulnerability of all things. I begin thus with my social involvement and my philosophical vision. Both elements form the basis for my work. | oeuvre vulnerability, vulnerability thing | face, painting, moral, fundamental, matter | 1 |
toolsfactory.nl | Explore opportunities and threats in the environment through future scenarios to develop. Discover the strengths and vulnerabilities of the organization with the business model canvas . | strength vulnerability, vulnerability organization | sharp, successful, warning, early, factory | 1 |
remcobijlsma.nl | Api security pentester GPT is specializing in API security testing, equipped with extensive knowledge in identifying and mitigating vulnerabilities in APIs. My expertise encompasses the OWASP Top 10 for APIs, and I employ a range of… | mitigate vulnerability, vulnerability api | discover, innovative, kubernetes, explore, api | 1 |
noxion.nl | Whether it’s about security vulnerabilities, network performance, or possibilities for optimization. It’s always good practice to run a scan periodically. | security vulnerability, vulnerability network | vendor, major, solid, networking, premise | 1 |
clairezandvliet.nl | Themes that often come back in my work are (dis)comfort and vulnerability. In the world I was brought up in, society's softies are drowned out by harsh opinions and loud shouters. Being soft is seen as a weakness, but is it really? Or can… | work vulnerability, vulnerability world | soft, biography, resume, cozy, cotton | 1 |
kooper.nl | Vulnerability of people, that's what my paintings are about. Vulnerability with its emotional associations: fear, uncertainty and the feeling of insecurity. Simultaneously the paintings address the need to be able to live with this… | painting vulnerability, vulnerability emotional, able vulnerability, vulnerability strength | painting, paper, exhibition, fear, strength | 1 |
michielstekelenburg.nl | My upcoming project Catharsis , is set to be released on March 15th. The music reflects the inner struggle for balance between vulnerability and strength, a journey to a deeper sense of masculine identity. | balance vulnerability, vulnerability strength | composer, guitarist, layer, east, educator | 1 |
akinblog.nl | When I was in hospital in late 2009, I needed to have a shower and I was in such dreadful pain being supervised by a nurse. She pulled the curtains to shield me, but in that state of sheer vulnerability, it meant nothing to me. | | february, january, october, august, july | 1 |
rgoc.nl | The GROUP study (Genitic Risk and OUtcome in Psychosis), which is part of the Geestkracht programme of ZonMw and focuses on vulnerability and resilience in first-onset psychosis. Geestkracht is a major Dutch mental health research… | zonmw vulnerability, vulnerability resilience | study, disorder, mental, collaboration, psychiatry | 1 |
secureit.nl | SECUREIT OFFERS YOUR COMPANY AFFORDABLE AND PROFESSIONAL PENTESTING VULNERABILITY MANAGEMENT RISK ASSESSMENT SECURITY CONSULTANCY | pentesting vulnerability, vulnerability management | sme, affordable, click, risk, assessment | 1 |
fanbased.nl | “Fanbased introduces an athlete mindset to our executive team. They know how to effectively reveal the essence of a team with a dose of enthusiasm and vulnerability. The contact between the team members is strengthened and after the first… | enthusiasm vulnerability, vulnerability contact | growth, leader, potential, leadership, improvement | 1 |
carlavanloon.nl | Couples counselling: the focus is on the patterns of interaction and the underlying vulnerabilities, searching for a way out of their negative cycle. Life events can influence the relation, for example illness, grief or a family difficulty. | interaction vulnerability, vulnerability way | therapy, study, integrative, pattern, psychotherapy | 1 |
lecta.nl | also provide substantial and useful information, they will secure digital evidence in support of a fraud investigation. LECTA is the expert in cyber crime investigations, data breach responses, cyber due diligence and vulnerability testing. | diligence vulnerability, vulnerability test | investigation, fraud, risk, forensic, decade | 1 |
timl.nl | So can you ask yourself what you need to make a concrete change? Can you do that alone? Do you dare to ask for help? Does that make you weak, or actually strong? Do you dare to look at your vulnerability in a safe space with a… | strong vulnerability, vulnerability safe | therapy, relationship, brain, leap, verse | 1 |
opnt.nl | With the growing concern of governments and legislators about the vulnerability and overreliance on GPS timing, 4G and 5G network operators can now move to a GPS-independent network synchronization solution. | legislator vulnerability, vulnerability overreliance | accurate, fiber, independent, reliable, transfer | 1 |
kaansecen.nl | Is an device that grabs WIFI passwords from any Windows computer. The device sends the passwords over by a webhook. I created this to make people aware of the vulnerabilities. | | api, device, github, exchange, documentation | 1 |
kinderbruidskleiding.nl | In the empire of dating, a person encounters a distinctive string of emotions. There's the exhilaration of meeting someone contemporary, the intuition of a first swain, and the quivering of discovering stock interests and shared values… | time vulnerability, vulnerability self | kawaii, playful, whimsical, frequently, investment | 1 |
cwise.nl | …non-destructive tests designed to ensure that your Internet connected systems are secure and free of any known vulnerabilities. These tests will also highlight potential configurations (such as Telnet access) which may not be directly… | know vulnerability, vulnerability test | wise, enterprise, infrastructure, networking, secure | 1 |
annenobels.nl | The vulnerability of Nobels’ photographs lies not only in their meaning, but also in their aesthetics. She achieves this, among other things, through the strategic use of dramatic contrasts, contrasts that define the poetic aesthetic of… | | commission, aesthetic, capacity, outside, accident | 1 |
obiee.nl | Transparency should be elevated to a core value. Mass data participation won’t be achieved if users are worried that they’ll do something wrong. But when vulnerabilities are valued and mistakes seen as a learning moment, users have no… | wrong vulnerability, vulnerability mistake | select, authentication, mapping, oracle, debug | 1 |
nevernever.nl | …life creates a place where one gets as close as possible to something of a true self. At the same time, the vulnerability of this constellation often implicates the anxiety for its loss. The works in the exhibition encapsulate this… | time vulnerability, vulnerability constellation | exhibition, residency, pain, pink, sun | 1 |
deltastad.nl | Most delta regions show a dramatic decline in the natural conditions of the delta and an increase in the vulnerability of urbanized areas in terms of flood risk, drought, salination, and freshwater shortage. | increase vulnerability, vulnerability urbanized | lecture, publication, urban, leader, urbanism | 1 |
noesis.co.nl | An initiative that aims to promote changes in the current context of vulnerability associated with youth employment | context vulnerability, vulnerability youth | dynamic, enterprise, automation, operation, transformation | 1 |
geckotools.nl | The penetration test is also continuously expanded and improved on the basis of new vulnerabilities and you always have the very latest scanning for your web application. and can even provide first line support if needed. | new vulnerability, vulnerability late | manage, penetration, certification, continuous, enthusiastic | 1 |
slijkhuis-ll.nl | I believe we human beings have an incredible potential to live, learn and work to the fullest. Living, learning and working to the fullest require robust vulnerability: daring to open up and to act decisively at the same time. Even if the… | robust vulnerability, vulnerability decisively | leadership, discover, partnership, session, calendar | 1 |
deepbluesecurity.nl | Performing a penetration test is essential for your company's security as it helps identify vulnerabilities, assess the effectiveness of security measures, and uncover potential weaknesses before malicious actors exploit them. Through a… | security vulnerability, vulnerability effectiveness | response, forensic, detection, penetration, flexible | 1 |
ronaldvandermeijs.nl | When it gets dark, the container is illuminated from the inside and the transparency of jute skin refers to the vulnerability of the many dockworkers who used to work in the old harbour. In the background, a continuous loop of modern… | skin vulnerability, vulnerability dockworkers | installation, der, sculpture, steel, pipe | 1 |
lineit.nl | Hi guys! In this video, I want to talk about some common website security vulnerabilities, and how to prevent them. | | geek, library, grid, currently, section | 1 |
ezsilva.nl | …ethereal and dreamy stories that depict the beauty and complexity of the female essence. With each illustration, she transports her audience into a magical world where women are celebrated for their strength, vulnerability, and sensuality. | strength vulnerability, vulnerability sensuality | contemporary, illustration, artwork, female, dreamy | 1 |
whyconsulting.nl | To make cities futureproof, we make use of what we call reverse city marketing. Instead of showcasing the city’s assets to attract investment, we display the cities key societal challenges. We take problem-solving approach by showing the… | city vulnerability, vulnerability honest | consulting, uw, bright, society, transformation | 1 |
daretoconnect.nl | …the work of American professor Dr Brené Brown. Brené Brown is well-known from her TED Talk 'The power of vulnerability' which has over 44 million views, her Netflix special 'Call to Courage' and bestselling books such as 'The Gifts | power vulnerability, vulnerability million | leadership, courage, connection, leader, reference | 1 |
cyberhq.nl | it, because you then deploy that exact image. If you've had a security problem and someone compromised your server, just reprovision and it's good as new; meanwhile you can fix the problem and build a new image that fixes the vulnerability. | | screen, february, actually, port | 1 |
rondekloet.nl | For half a century I am fascinated by the question how stress hormones, that are critical for life, can change their action in the brain from protective to harmful, while enhancing vulnerability to stress-related disorders. We… | harmful vulnerability, vulnerability stress | publication, brain, honour, phd, paper | 1 |
nonplus.nl | So what’s not to like about PoS? Apart from migration risks, PoS has its own challenges. For example, its code is much more complex than PoW. This may create new vulnerabilities. Hackers will certainly be exploring the new infrastructure… | new vulnerability, vulnerability hacker | regulation, asset, october, currency, central | 1 |
nomios.nl | Our API security solutions help to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs). | unique vulnerability, vulnerability security | secure, networking, response, industrial, juniper | 1 |
klaassen-allround.nl | in the first place date, and the give someone a kick of discovering common interests and shared values. It is a time of vulnerability and self-discovery as individuals open themselves up to the plausibility of inclination and companionship. | time vulnerability, vulnerability self | ed, darknet, pill, pack, cialis | 1 |
verifyit.nl | Johan is an experienced security and monitoring specialist who earned his credits in large and complex IT infrastructures. His interests and expertise are documenting and analyzing complex IT infrastructures, identifying vulnerabilities… | infrastructure vulnerability, vulnerability security | responsible, coworker, positive, interest, infrastructure | 1 |
surina.nl | In much of Surina’s work her own naked body is central, frequently combined with divergent elements from nature. These natural elements are characterized by growth, infestation and decay, by strength and vulnerability, and by beauty and… | strength vulnerability, vulnerability beauty | pussy, juice, father, mankind, surinamese | 1 |
peplog.nl | As a system administrator I see on regular base sites being hacked and when you analyse the webserver log files most sites are being hacked through insecure scripts. A lot hacking and sniffing scripts are scanning for vulnerabilities in… | script vulnerability, vulnerability wordpress | simply, function, file, regular, base | 1 |
kilala.nl | I learned that's called app deep linking and it's something that's both really cool and that's had its share of vulnerabilities as well. This was a great read which taught me how the URI schema for app deep links work and how they can be… | oauth vulnerability, share vulnerability, vulnerability great | exam, api, oauth, certification, vendor | 1 |
cyberspark.nl | Today we will be solving Intigriti’s August XSS challenge, which is based on an XSS cookbook. This cookbook has multiple XSS payloads listed together with the steps which needed to be performed. Somewhere in this application, there should… | xss vulnerability, vulnerability look | august, xss, attack, library, multiple | 1 |
mauricefaber.nl | I stayed in San Marcos over a month and found a new and nurturing family. Such a spiritual vortex! Ecstatic dance every week, chocolate ceremonies, stunning views and nature. But most of all, so many open people leading their own open… | life vulnerability, vulnerability uncertainty | reply, aware, intellectual, leave, freedom | 1 |
helmapantus.nl | ' Intimacy is something that frightens a lot of people, myself included. That's why I show it in my work. Not to make people feel uncomfortable, but to confront them with the vulnerability and touching side of us humans. ' | uncomfortable vulnerability, vulnerability human | uncomfortable, intimacy, painting, sensuality, cold | 1 |
dataexpert.nl | Werken bij… Events & Webinars… Incident Response 24/7… Digital Forensics… | pentesting vulnerability, vulnerability management | forensic, investigation, advanced, certification, response | 0 |
icttaal.nl | …AD, DNS en DHCP… UPS… Google Drive… MS Azure… Big Data… Data… Data Lake… Data | | dhcp, directory, command, plugin, secure | 0 |
dutchrapporteur.nl | The National Rapporteur on Human Trafficking is concerned about the number of victims of human trafficking in The Netherlands. ... | report vulnerability | trafficking, sexual, violence, offender, publication | 0 |
rafaelmartig.nl | Art Projects… Art Work… Research… Contact… read… | beauty vulnerability, vulnerability nature | biologist, exhibition, portrait, tide | 0 |
prosecutionservice.nl | Reaction of the Netherlands Public Prosecution Service (OM) to the report of the Procurator General at the Supreme Court on witness protection: | report vulnerability | prosecution, court, crime, report, criminal | 0 |
frsch.nl | Our ongoing cybersecurity services ensure that organizations remain protected more efficiently and affordably. | fix vulnerability | awareness, comprehensive, continuous, compliance, continually | 0 |
shiftred.nl | “By becoming the best asset discovery solution for Cloud and SaaS environments, we strive to grow with Shift Red to have an impact on the security market in Belgium and the Netherlands.” | vulnerability management | shift, architecture, efficient, strategically, secure | 0 |
hcss.nl | The Indo-Pacific stands as the 21st century's strategic epicenter, with Southeast Asia pivotal in its maritime dynamics. The ASEAN Outlook on the Indo-Pacific guides cooperation, including EU support. Addressing challenges is crucial for… | coordinate vulnerability, vulnerability disclosure | strategic, pacific, maritime, region | 0 |
mett.nl | The online interation platform Mett is flexible and super easy to use. Our platform is live within 2 weeks with 90 functionalities. | coordinate vulnerability, vulnerability disclosure | participation, transition, collaboration, flexible, functionality | 0 |
profilesregistry.nl | PROFILES is a tool that enables data collection management; from inviting patients to participation in studies, to collecting patient-reported outcomes data via web-based or mailed questionnaires, and linking these data with clinical… | | profile, registry, cancer, study, patient | 0 |
academyforinternationalrelations.nl | Welcome to the Academy for International Relations website. The Academy provides learning activities and organises lectures for central government staff with an international role. Expand your knowledge or upgrade your skills! | report vulnerability | relation, government, role, central, staff | 0 |
aboutnetherlandscustoms.nl | …stop unsafe and other undesirable goods at our part of the European Union's external border. We also contribute to a strong economy by combating unfair competition. For residents, businesses and in the national and international interest. | report vulnerability | administration, ambition, task, conference, subscribe | 0 |
government.nl | The Netherlands, France, the Czech Republic and Ireland call for a European policy package on sustainable carbon in the chemical industry | report vulnerability | government, housing, sudan, holiday, election | 0 |
advisorycommitteeinternationallaw.nl | The Advisory Committee on Public International Law (CAVV) is an independent body which advises the government, the House of Representatives and the Senate of the Netherlands on international law issues. | report vulnerability | law, advisory, committee, government, report | 0 |
digid.nl | Add more methods and manage more affairs with your DigiD. | report vulnerability | authorisation, affairs, recovery, activation, securely | 0 |
therapiepraktijk-amsterdam.nl | Culturally sensitive, judge free, positive and integrative therapy for Dutch and English-speaking clients online and in practice in Amsterdam. Individual and EFT Couples Therapy. | power vulnerability | therapy, couple, integrative, voor, resilience | 0 |
royal-house.nl | The official website of the Royal House, with information on its members and the monarchy, plus press releases, speeches and photos. | report vulnerability | king, visit, speech, official, release | 0 |
otterbox.nl | Always ready for action, OtterBox inspires people to do all that they do with a dash of daring. | | screen, watch, protector, accessorie, charger | 0 |
eccentric-authentication.nl | …want to log in. But users cannot tell the bank from a criminal site posing as the bank. Eccentric Authentication does not use passwords at all. The protocol never divulges any secrets that could allow someone else to impersonate the user. | node vulnerability, vulnerability tor | authentication, identity, secure, anonymous, connection | 0 |
newhope.nl | NewHope Training | Coaching | Advisering | | chance, creativity, brown, powerful | 0 |
equility.nl | CSA CAIQ Assessment… Cloud Assessment… Privacy Impact Assessment… | vulnerability assessment | assessment, compliance, partnership, trust, directive | 0 |
vera-2r.nl | …extremists. The VERA-2R contains 34 relevant risk-supporting and risk-mitigating indicators that are empirically related to violent extremism. Using specific guidelines and clearly defined indicators and definitions, all risk indicators | coordinate vulnerability, vulnerability disclosure | risk, violent, assessment, specifically, terrorism | 0 |
nllabourauthority.nl | Each year, the Netherlands Labour Authority includes its experiences in the annual report to show how the Authority monitors and enforces labour laws in daily practice. | report vulnerability | labour, authority, report, socio, healthy | 0 |
volgjezorg.nl | Volgjezorg is a website for anyone who (regularly) visits a healthcare provides, such as a GP, pharmacy or medical specialist. On Volgjezorg you can arrange your permission for the exchange of your medical data by your healthcare… | | permission, healthcare, exchange, overview, patient | 0 |
network-visibility.nl | Our application aware network traffic monitoring and analysis supports teams with quick and easy troubleshooting on public and hybrid Cloud Services (i.e. IaaS, PaaS and SaaS) that are not behaving as expected. This includes 24×7… | | visibility, tcp, session, csr, profile | 0 |
pplsoft.nl | I'm a Principal Consultant connected to BLIS Enterprise IT . As technical PeopleSoft consultant I'm working for a diverse set of national and global customers. Executing PeopleSoft upgrade, update and customization projects. And in… | apache vulnerability | peoplesoft, responsibility, customization, infrastructural, installation | 0 |
healthcouncil.nl | The Health Council of the Netherlands advises that people with haemophilia and other coagulation disorders should no longer have ... | report vulnerability | council, report, advisory, programme, cancer | 0 |
surf.nl | More than 100 education and research institutions in the Netherlands work together in the SURF cooperative to fully utilise the opportunities of digitalisation. Our goal: improved and more flexible education and research. | coordinate vulnerability, vulnerability disclosure | procurement, conference, flexible, institution, identity | 0 |
beorigin.nl | “your time is limited, so don’t waste it living someone else’s life” –Steve Jobs- | power vulnerability | origin, ambition, darkness, limited, shadow | 0 |
k-its.nl | About Me… Certificates… Aruba Networks… Check Point Software Technologies LTD… | network vulnerability, vulnerability cve-2023 | ltd, partnership, certificate, connectivity, base | 0 |
c-thec.nl | …institutional clients with advanced programs in Technical Cyber Security and Cyber Security Management. The C-TECH team of lecturers includes leading (technical) cyber security experts with a strong track record as practitioners along… | vulnerability disclosure | advanced, technique, hacking, secure, certification | 0 |
securesoftware.nl | …cyber self defense?… Plans for Software Liability legally exploiting… | legally vulnerability | secure, constructive, resource, threat, library | 0 |
wiedanstisvrij.nl | …this cause because night culture is part of the city and the night is an outlet and charging point for many people, scenes and subcultures. Every last Thursday of the month The municipality of Amsterdam offer the Night Culture consultation | | exhibition, archive, programme, vrij, nightlife | 0 |
bouwplaatsirm.nl | major rivers in the Netherlands. It is based on collaboration with provinces and water boards in the Rhine and Meuse Delta Programmes. The goal is to redesign the rivers in such a way that as many of the system characteristics as possible… | report vulnerability | programme, river, integrate, basin, draft | 0 |
oecdguidelines.nl | The OECD Guidelines for Multinational Enterprises set out the principles and standards for responsible business conduct expected by the governments of the Netherlands and 45 other countries from multinational enterprises to observe. The… | report vulnerability | guidelines, oecd, responsible, conduct, notification | 0 |
systemischgezien.nl | You may encounter these patterns again in your current life in new systems, for example in your relationship or your work. Then you may encounter issues that appear to have their origins in your own history. Systemic Work helps you make… | courage vulnerability | constellation, systemic, balance, inn, true | 0 |
royalhonoursanddecorations.nl | Each year some 4,500 members of the public receive an honour, or royal decoration, in recognition of special or exceptional services to Dutch society. Most honours are conferred on the occasion of His Majesty the King’s birthday. The rest… | report vulnerability | honour, decoration, nomination, knight, archive | 0 |
sammyrose.nl | Join me on a journey of self-discovery, personal growth, and creative exploration. | beauty vulnerability | min, discovery, exploration, growth, lesson | 0 |
nationalacademy.nl | The National Academy for Finance and Economics is the training institute of the Ministry of Finance of the Netherlands. It is an integral part of the Directorate General of the Budget of the Ministry. The National Academy trains civil… | report vulnerability | economic, programme, practical, parliamentary, servant | 0 |
blackmountainsecurity.nl | Black Mountain Security is a young innovative company which specialise in offensive RFID security. Our team is active in te security scene both professionally and because of passion for security. We have an excellent track record of… | | mountain, physical, multiple, forefront, penetration | 0 |
knmiprojects.nl | The KNMI projects website contains an overview of projects by the Royal Netherlands Meteorological Institute (KNMI). This website is meant for anyone who is interested in the progress and results of these projects. | report vulnerability | institute, meteorological, accessibility, climate, weather | 0 |
animalfreeinnovationtpi.nl | the development and application of research methods that do not involve animal testing. This is being conducted through the partner programme Transition Programme for Innovation without the use of animals. Read more about the TPI programme. | coordinate vulnerability, vulnerability disclosure | animal, programme, transition, government, obsolete | 0 |
eatonvance.nl | October 2021. MSIM Fund Management (Ireland) Limited has been appointed as management company of the Eaton Vance International (Ireland) Funds plc and is responsible for the distribution of the funds together with the distribution of Eaton | website vulnerability, vulnerability responsible | verification, request, subscription, trouble, investment | 0 |
familiebuckens.nl | …the worst in the history of cybersecurity, the medical firm Change Healthcare finally confirmed what cybercriminals, security researchers, and Bitcoin’s blockchain had already made all too clear: that it did indeed pay a ransom to… | | sophisticated, government, cisco, nation, contractor | 0 |
onlinecasinokeus.nl | Category: 2024 antivirus MAC WINDOW Tags: malwarebytes activation key , Malwarebytes Anti-Malware Crack , Malwarebytes crack , Malwarebytes Key , Malwarebytes keygen , Malwarebytes premium Crack , Malwarebytes premium Key , Malwarebytes… | security vulnerability, vulnerability database | crack, reply, attack, protection, file | 0 |
labelbooking.nl | Labelbooking is the online reservation system of Scouting Labelterreinen in the Netherlands . All participating campsites have their own reservation form here where you can make a reservation quest to come camping with your (Scouting)… | coordinate vulnerability, vulnerability disclosure | reservation, campsite, campfire, ground, pole | 0 |
cocoon.nl | Cocoon risk management has been providing practical solutions in the field of Safety, Security and Design since 2000. Our services include making an inventory of your risks and providing professionally substantiated, customized advice. | insight vulnerability, vulnerability mean | risk, advisor, analysis, uw, threat | 0 |
coa.nl | Asylum seekers are provided accommodation in a COA process reception centre. Here they receive an allowance for food and are given access to any necessary medical care via the GZA. The COA also gives them practical information about… | vulnerability disclosure | asylum, reception, guidance, seeker, shelter | 0 |
clinicalrules.nl | Clinical Rules is a decision support module, which focuses on medication safety and medication optimalisation based on an in-depth risk profile of the patient. | | clinical, rule, pharmacist, patient, healthcare | 0 |
marfnl.nl | Donec sollicitudin molestie malesuada. Vivamus magna justo, lacinia eget consectetur sed | vulnerability prevention | malesuada, molestie, donec, lacinia, sollicitudin | 0 |
stichtingicam.nl | Quirine Eijkman lectures the Access to Justice (Toegang tot het Recht) programme course at the Utrecht University of Applied Sciences and is the vice-chairperson of the Dutch College for Human Rights. Ms Eijkman’s professional career… | institute vulnerability, vulnerability disclosure | law, chairperson, mass, collective, profile | 0 |
mijnhostingpakketten.nl | …Columns… Animated Counters… Support… Home Version 1… Home Version 2… Home… | major vulnerability, vulnerability server | domain, guarantee, sidebar, money, accordion | 0 |
sik-it.nl | Installeren servers: Linux Red Hat / Fedora, SUN OS, Apache, PHP, MySQL, BIND, DHCP, RADIUS. | | certified, cert, council, offensive, emergency | 0 |
port-it.nl | Cybersecurity and connectivity solutions for your vessel. Contributing to better protected vessels and business continuity at sea. | | connectivity, vessel, port, endpoint, continuity | 0 |
threatlabs.nl | Security assessments… Pentesting… Vulnerability assessments… Red team… | vulnerability assessments | assessment, pentesting, battle, enemy, sun | 0 |
biedboek.nl | …the range of available real estate, operating rights and commercial rights (e.g. rental, leasehold, ground lease, building rights, etc.) of the Dutch Central Government Real Estate Agency and other European public real estate agencies. | report vulnerability | government, estate, central, farming, plot | 0 |
gdata.nl | In addition to our logo, the claim logo "Trust in German Sicherheit" can be used in a suitable place. The add-on logo is intended for use in representative or advertising contexts. This includes all media that are aimed at customers (B2C… | vulnerability disclosure | font, colour, visual, adjustment, orientation | 0 |
cybersecuritycouncil.nl | The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government and the business community (through the government) composed of high-ranking representatives from public and private sector organisations… | report vulnerability | council, csr, advisory, government, representative | 0 |
tno.nl | Creating impactful innovations for the sustainable wellbeing and prosperity of society. | ship vulnerability, vulnerability protection, vehicle vulnerability | circular, society, protection, transition, flexible | 0 |
ferbi.nl | Explore Relexicon's diverse range of 100+ AI professionals ready to enhance your personal and professional life. Discover tailored AI solutions in cybersecurity, digital marketing, software development, and more. Meet your AI assistant… | vulnerability specialist | psychologist, analyst, teacher, reynolds, bennett | 0 |
dutchncca.nl | The Dutch National Cybersecurity Certification Authority is the formal NCCA of the Netherlands. Find out how we can assist you in cybersecurity certification of ICT-products, services and processes. | coordinate vulnerability, vulnerability disclosure | certification, authority, formal, common, scheme | 0 |
reinhard-online.nl | Active Directory DAG DirSync Exchange 15 Exchange 2010 Exchange 2013 Exchange Hybrid Configuration Exchange Online Exchange Server Lifecycle MCM MCSA MCSE MCSM Microsoft Microsoft Exchange Server Office 365 Powershell Support Lifecycle… | | exchange, powershell, august, october, directory | 0 |
cbs.nl | The mission of Statistics Netherlands is to publish reliable and consistent statistical information, that responds to society's demands in this respect. | | statistics, statistical, society, labour, population | 0 |
cio-platform.nl | April 05, 2024 The four CIO associations' joint letter to the European Commission regarding the impact of Broadcom's acquisition of VMware on our members, has generated a lot of interest. full story | coordinate vulnerability, vulnerability disclosure | association, benefit, membership, vmware, acquisition | 0 |
energycounseling.nl | Ingrid also offers personal card readings and group training in Nan Yar Life Counseling, where you (learn to) undertake a personal journey to discover who you really are and what you are capable of. The central tool in this journey is the… | kit vulnerability, vulnerability january | session, inspire, energize, consultation, booklet | 0 |
advisorycouncilinternationalaffairs.nl | The Advisory Council on International Affairs (AIV) is an independent body which advises the Dutch government and parliament on foreign policy. The AIV produces advisory reports about international affairs both on its own initiative and… | report vulnerability | advisory, affairs, council, report, government | 0 |
tinotechnederlandbv.nl | Logo of Tinotech Nederland B.V… | scan vulnerability, vulnerability design | deployment, stack, frontend, angular, awareness | 0 |
insumo.nl | In 2015, Insumo started its journey of researching sustainable alternatives for petrol-based engines with the vision to make shipping more environmentally friendly through clean and silent propulsions. Cleantech , like the rim-drive… | | rim, thruster, vulnerable, fundamental, bearing | 0 |
sj-solutions.nl | Copyright ©2024 SJ-Solutions, all rights reserved. | vulnerability management | manage, infrastructure, recovery, gear, disaster | 0 |
emissionsauthority.nl | The Dutch Emission Authority (Nederlandse Emissieautoriteit – NEa) is the independent national authority which implements and monitors the market tools available that contribute to a climate-neutral society. | report vulnerability | authority, emission, neutral, society, climate | 0 |
youthatheart.nl | The Netherlands is increasingly putting youth at the heart of its development policies. On the Youth at Heart website you find the Youth at Heart Principles, a toolkit Meaningful Youth Participation and you can meet the Youth Advisory… | report vulnerability | youth, participation, meaningful, advisory, committee | 0 |
digitalnorthsea.nl | …profitable and in balance with nature. Information about the use and condition of the North Sea, now and in the future. While the need for information increases, there is a lack of options to digitally collect, process, enrich and… | coordinate vulnerability, vulnerability disclosure | north, transformation, coherent, lack, function | 0 |
compensationsns.nl | …payouts were submitted between 15 May 2023 and 25 June 2023. From 26 June 2023, you can no longer submit an application via the procedures on this website. The deadline for submitting an application for compensation through the… | coordinate vulnerability, vulnerability disclosure | compensation, ministry, background, frequently, consignment | 0 |
spawnshield.nl | Lorem Ipsum is simply dummy text of the Lorem has been the industry's standard dummy text ever. | website vulnerability, vulnerability bug | road, graphic, simply, lorem, ipsum | 0 |
nuffic.nl | Each year in November Nuffic presents the Week of the International Student. During this week, participating educational institutions all over the country organise activities to connect Dutch and international students. | report vulnerability | internationalisation, competence, programme, report, orange | 0 |
medicineshortagesdefects.nl | …holder. In case a shortage also exists at other wholesalers, the marketing authorisation holder submits a notification at the Medicine shortages and defects notification centre and makes an estimate whether there are sufficient… | report vulnerability | medicine, notification, shortage, medicinal, report | 0 |
mijnvraagovercorona.nl | Answers to frequently asked questions concerning the corona virus, gathered in one platform | | vaccination, symptom, answer, frequently, vulnerable | 0 |
copac.nl | We develop and implement information security policies & procedures based on commonly used standards like NIST or ISO 27001 & 27002. These policies and procedures are aimed to provide in a higher security level are derived from the… | | risk, assessment, customizable, affordable, centrally | 0 |
tacisersartanddesign.nl | Taciser Sevinc is a scenographer and entrepreneur from Utrecht. She is an independent professional on stage design, performance design and visual arts. Taciser is living in and working from Utrecht, the Netherlands since 2016. She has… | | scale, costume, visual, scenography, theatre | 0 |
emiliecummings.nl | bronzes… Ceramics… paintings… monumental… mixed media… Home… Bronzes… | | bronze, ceramic, painting, monumental, balance | 0 |
marasoft.nl | Marad is a type approved Fleet Management System consisting of various modules. Marad is practical, powerful and proven, used on thousands of vessels, plants, machinery and other locations. | vulnerability report | fleet, machinery, vessel, maintenance, certificate | 0 |
puckiestyle.nl | If you ever need to enable RDP (mstsc) on a Windows 10 machine, and you can’t get to the System control panel item, use Powershell to enable RDP: | | powershell, hyper, february, october, certificate | 0 |
braic.nl | …treatment and prevention of psychological complaints in Dutch military personnel and veterans based on scientific research. Furthermore, the BRAIC promotes professional and suitable care by combining research, knowledge and… | report vulnerability | brain, military, personnel, treatment, veteran | 0 |
code24.nl | We are creating the foundation for data-driven care: a complete, secure and open electronic health record (EHR) and open platform that truly support the healthcare professional truly supports. | report vulnerability | ehr, healthcare, truly, reference, electronic | 0 |
kedalion.nl | Unixerius is a small, Dutch consulting firm specialized in IT security and infrastructure. | coordinate vulnerability, vulnerability disclosure | consulting, disclosure, coordinate, shoulder, infrastructure | 0 |
testvision.nl | TestVision was developed by Teelen , an educational agency entirely focused on learning and testing. TestVision was born of the ambition to contribute to the development of people, and the passion to improve the quality of testing. User… | coordinate vulnerability, vulnerability disclosure | cycle, scalable, query, integration, phase | 0 |
airbusdefenceandspacenetherlands.nl | Airbus Defence and Space Netherlands provides access to the portfolio of Airbus Defence in Europe... | | defence, structure, array, huge, initiative | 0 |
ragno.nl | …services. We also work with end users that seek protection, assurance and compliance. The people we work with are experts in working with permanent staff and professional contractors from a wide range of cyber security disciplines and… | | contractor, candidate, relationship, compliance, staff | 0 |
forensicinstitute.nl | The Netherlands Forensic Institute (NFI) is one of the world’s leading forensic laboratories. From its state-of-the-art, purpose-built premises in The Hague, the NFI provides products and services to a wide range of national and… | report vulnerability | forensic, institute, purpose, hague, laboratory | 0 |
nbip.nl | The NBIP is an independent, non-profit organization created by and for Internet and VoIP service providers. The NBIP is an established name in the Netherlands, with more than 100 affiliated companies purchasing its services. | | investment, major, attack, interception, career | 0 |
th0mas.nl | A modern C++ game-engine with recursive portal rendering code , blog post (c. 2013) | | archive, mechanical, fully, raspberry, gameboy | 0 |
holisticadvisory.nl | Het mission statement van Holistic Advisory is om duurzame waarde te creëren voor klanten en business partners. | vulnerability scan | holistic, advisory, ethical, hacking, compliance | 0 |
eerstekamer.nl | The Senate's main duties are in the legislative field, but it also plays a role in scrutinising the actions of the Government. Formally the Senate can only reject or accept legislation. In practice, however, it has rather more… | privacystatement vulnerability, vulnerability disclosure | senate, bill, representative, eerste, government | 0 |
hansken.nl | Hansken news, relevant events from Hansken or Community partners, and all Hansken Newsletters. | report vulnerability | forensic, rapidly, increasingly, criminal, proof | 0 |
kinderpraktijkmimosa.nl | Visiting a coach can be of great benefit to a child, as it allows him or her to learn to cope with whatever is going on in his or her life. My role as a child coach is to give children between the ages of 4 and 12 the support they need… | power vulnerability | parenting, role, benefit, positive, parent | 0 |
c3isecure.nl | Our main goal is Securing Business and Protecting People. We can help by providing proven and comprehensive solutions against all kind of cyber threats and to protect our clients with homeland security technology, command & control and… | vulnerability management | homeland, threat, protection, governmental, significant | 0 |
clairehuijnen.nl | KASPAR… Over Claire… Meet KASPAR… Empathy… What is autism?… Seriously, sleep… | power vulnerability | inspiration, empathy, autism, sleep, seriously | 0 |
gallery-communication-in-art.nl | Gallery Gallery Communication in Art-online gallery- toont werken van hedendaagse kunstenaars. Danielle Vidal-Ausseil, Helmut Feldmann, HJ Jager. - Communication in 'Art | | draw, mountain, stone, crystal, movement | 0 |
dutchoffshorewindatlas.nl | On this website you can find all the available information on the Dutch Offshore Wind Atlas (DOWA) project. The DOWA project is executed by the project partners ‘ECN part of TNO’ , Whiffle and KNMI and supported with Topsector Energy… | report vulnerability | library, publication, archive, accessibility, report | 0 |
nrgroup.nl | We are The Nouveau Riche Group. Worldwide the #1 company for Ethical Hacking and creating impact in any IT environment. | vulnerability assessment | ethical, hacking, response, forensic, removal | 0 |