What Is Phishing? Firstly, let's have a quick recap on phishing. Phishing aims to lure...
NIS – The EU-Wide Cyber Security Initiative In July 2016, The current Network and...
Despite the difficult current conditions in the investment market, specialist B2B...
Gartner IT Symposium/Xpo Conference 2022, Barcelona, Spain, 7 November: Holm Security has given organizations the tools needed to lower the risk of malicious...
Red Herring’s Top 100 Global list has become a mark of distinction for identifying promising companies and outstanding entrepreneurs. Red Herring editors were...
OpenSSL has categorized the issue as critical, a designation it uses to indicate a vulnerability that “affects common configurations” and is likely...
Within the last year, 29% of businesses within Poland experienced at least one cyber-attack. To tackle the ever-growing number of threats, Holm Security and...
What Is Cloud Security Posture Management (CSPM)? CSPM automates the identification and remediation of risks across your cloud assets, including Infrastructure...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...