Systematic & risk-based = proactive cyber defense When analyzing the key purpose of NIS...
We’ve Recently Done a Pen Test of Our Infrastructure Pen tests are a great step in...
The Drawbacks of Traditional Vulnerability Management Traditional vulnerability...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...
CVSS is a standardized method used to determine the severity of vulnerabilities in the software across your technical assets. The vulnerabilities are assigned...
General information Two RCEs exist and three vectors are being discussed online (one of which is not known to be remotely exploitable):
Tackle the “Itches” of Traditional Vulnerability Management With a drastically growing remote workforce, many organizations are looking into how to get...
This vulnerability can allow an attacker to gain complete control over entire systems if exploited on a server. Any system that could be exploited should be...
We're proud to report that Holm Security is featured in the recent edition of Gartner's Voice of the Customer report. This success lies in our ability to...