

In today’s rapidly evolving threat landscape, maintaining a robust vulnerability...
You have probably heard of it. Maybe you’re already using it. Attack Surface Management...
There's a lot of buzz around SOCs At Holm Security, we meet with thousands of...
A constantly growing challenge in an evolving threat landscape Today, technological advancements and digitalization introduce new challenges and a constantly...
Systematic & risk-based = proactive cyber defense When analyzing the key purpose of NIS and NIS2, you will soon understand that a proactive cyber defense is...
We’ve recently done a pen test of our infrastructure Pen tests are a great step in securing your business. While penetration testing is complementary to...
The drawbacks of traditional vulnerability management Traditional vulnerability management is the process of identifying, assessing, and addressing...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...
CVSS is a standardized method used to determine the severity of vulnerabilities in the software across your technical assets. The vulnerabilities are assigned...