The type of security scanning required for a particular system depends on what that...
The Schrems II ruling disqualifies the transfer and processing of personal data from EU...
Since the start, Holm Security has had a vision of becoming a cornerstone in a modern cyber security defense, available for the masses. 5 years later we have...
So far it can be said that the Zoom team has reacted very quickly to the criticism and discoveries. As with other services, such updates will not resolve every...
As soon as we catch our breath and start to recover from the COVID-19 pandemic, organizations worldwide will evaluate their crisis preparedness. A plenitude of...
Airtel, India’s largest integrated telecommunications company, and Holm Security have entered into a partnership to offer Managed Security Services (MSS) to...
Password Spraying & Credential Stuffing An often recurring question I get asked is: “When do you think passwords will disappear?” Whatever we do, we will have...
At Holm Security, we provide solutions for vulnerability assessment. In meetings with our customers, we sometimes discuss previous incidents that could've...