What Is PCI DSS? PCI DSS, or Payment Card Industry Data Security Standard, is a globally...
Understanding API Security Let’s start at the beginning. What are APIs? In modern mobile,...
Do I Need to Care About Compliancy with Industry Standards? Compliance provides a...
The Drawbacks of Traditional Vulnerability Management Traditional vulnerability management is the process of identifying, assessing, and addressing...
NIS – The EU-Wide Cyber Security Initiative In July 2016, The current Network and Information Security Directive (NIS Directive) became the first piece of...
OpenSSL has categorized the issue as critical, a designation it uses to indicate a vulnerability that “affects common configurations” and is likely...
Within the last year, 29% of businesses within Poland experienced at least one cyber-attack. To tackle the ever-growing number of threats, Holm Security and...
What Is Cloud Security Posture Management (CSPM)? CSPM automates the identification and remediation of risks across your cloud assets, including Infrastructure...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...