

As digitization expands, our IT environments keep on growing and are becoming more and...
What is it? Cyber security in the cloud is a term that describes a service that is being...
What is it? To stop a hacker before he even thinks about getting into the target system,...
Until fairly recently, the concept of ongoing, continual monitoring of a network seemed like a dream due to the complex nature of what that kind of activity...
The type of security scanning required for a particular system depends on what that system is used. The more complicated and intricate the system or network...
The Schrems II ruling disqualifies the transfer and processing of personal data from EU countries to the US. But how does this affect cyber security products?...
Since the start, Holm Security has had a vision of becoming a cornerstone in a modern cyber security defense, available for the masses. 5 years later we have...
So far it can be said that the Zoom team has reacted very quickly to the criticism and discoveries. As with other services, such updates will not resolve every...