Despite the difficult current conditions in the investment market, specialist B2B...
Gartner IT Symposium/Xpo Conference 2022, Barcelona, Spain, 7 November: Holm Security has...
Red Herring’s Top 100 Global list has become a mark of distinction for identifying...
OpenSSL has categorized the issue as critical, a designation it uses to indicate a vulnerability that “affects common configurations” and is likely...
Within the last year, 29% of businesses within Poland experienced at least one cyber-attack. To tackle the ever-growing number of threats, Holm Security and...
What Is Cloud Security Posture Management (CSPM)? CSPM automates the identification and remediation of risks across your cloud assets, including Infrastructure...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...
Social Engineering – The weapon of the cybercriminals toward your human assets Social engineering is the art of exploiting human psychology rather than only...
CVSS is a standardized method used to determine the severity of vulnerabilities in the software across your technical assets. The vulnerabilities are assigned...