

The DORA regulation and the NIS2 Directive are both important parts of the EU’s cyber...
You have probably heard of it. Maybe you’re already using it. Attack Surface Management...
The Cyber Resilience Act (CRA) is the first regulation of its kind globally, making...
There’s a lot of buzz about AI these days. This is not that strange, as AI is a fast-emerging technology, but we’ve already seen it used to support or carry...
2024 was another very successful year for Holm Security. We made significant product improvements, strengthening our position as the market leader within...
There's a lot of buzz around SOCs At Holm Security, we meet with thousands of organizations every year. A clear trend is that more and more organizations are...
A constantly growing challenge in an evolving threat landscape Today, technological advancements and digitalization introduce new challenges and a constantly...
Systematic & risk-based = proactive cyber defense When analyzing the key purpose of NIS and NIS2, you will soon understand that a proactive cyber defense is...
Understanding the Vulnerability: A Memory Issue in Chrome The identified vulnerability (CVE-2024-4671) is classified as high-severity and has a CVSS v3.1 score...