• NIS2 compliance
    • Knowledge base
      • The NIS & NIS2 Directives
      • New in the NIS2 Directive
      • NIS2 sectors overview
      • Risk management requirements
      • Supply chain security requirements
      • Cyber hygiene requirements
      • 11 steps to compliance
      • Frequently asked questions
    • Resources
      • NIS2 Resource Guide
      • Upgrade Your Defense To Comply with NIS2
      • How the NIS2 Cyber Security Directive Will Impact You
      • NIS2 Local Resources
      • NIS2 in Norway
    • We support compliance
      • How we support NIS & NIS2 compliance
      • Automated & continuous risk assessments
      • Compliance packages for NIS & NIS2
      • Free NIS & NIS2 consultation
      • Book a platform demo
  • Platform
    • Solutions
      • Vulnerability management
      • Attack Surface Management (ASM)
      • External Attack Surface Management (EASM)
      • Automated penetration testing
    • Products
      • System & Network Security
      • Web Application Security
      • Cloud Security (CSPM)
      • API Security
      • Phishing Simulation & Awareness Training
    • Compliance
      • NIS & NIS2
      • DORA
      • ISO 27001
      • PCI DSS
      • GDPR
    • Pricing
    • Free trial
    • Quote
    • Request demonstration/meeting
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • Internet of Things
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transportation
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinar
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
Holm Security Yellow
  • Platform
      Solutions
    • Vulnerability management A complete platform for a systematic, risk-based & proactive cyber defense.
    • Attack Surface Management (ASM) Automatically discover and monitor assets throughout your entire attack surface.
    • External Attack Surface Management (EASM) Automatically discover and monitor internet and web-facing assets.
    • Penetration testing Automated penetration testing, including vulnerability management & ASM.
    • Products
    • System & Network Security Assessment of system/server, computers, network equipment, OT, cloud infra, IoT, and devices.
    • Web Application Security Advanced scanning of modern web applications.
    • Cloud Security (CSPM) Assessment of cloud-native platforms Azure, AWS, Google, and Oracle Cloud.
    • API Security Scanning of all types of REST, GraphQL, and SOAP APIs.
    • Phishing Simulation & Awareness Training Phishing simulation, awareness programs, and questionnaires.
    • Compliance
    • NIS2 logo NIS & NIS2 Platform for NIS and NIS2 compliance.
    • DORA_badge DORA Risk assessments for financial institutes.
    • ISO 27001 logo-1 ISO 27001 Risk assessments for ISO 27001 compliance.
    • PCI DSS_logo PCI DSS ASV for PCI DSS version 4.0 compliance.
    • GDPR logo GDPR Platform to protect personal data.
    • Holm Security VMP
      HOLM SECURITY VMP

      The complete platform for a systematic, risk-based, and proactive cyber defense.

      Pricing Request a quote
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • IoT (Internet of Things)
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transport
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinars
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
en
en Global
fr-be Belgium
da Denmark
fi Finland
de-de Germany
en-my Malaysia
nl Netherlands
no Norway
poland Poland
sv Sweden
en-gb UK
in India
uae Middle East
    • Security Center
    • Organizer
    • Partner Portal
Free trial

Latest insights | Claus Nielsen (2)

  • 1
  • 2
Your human firewall & first line of defense against cybercriminals June 16, 2022 — Phishing awareness Your human firewall & first line of defense against cybercriminals When discussing cyber security, your human assets (your employees) are often considered your weakest link against cyberattacks like phishing. According to Cisco's 2021 Cyber Security Threat Trends Report, phishing email attacks account for 90% of data...
Common Vulnerability Scoring System (CVSS) & why it is necessary
June 7, 2022 — Vulnerability management Common Vulnerability Scoring System (CVSS) & why it is necessary

CVSS is a standardized method used to determine the severity of vulnerabilities in the...

Spring4Shell: zero-day vulnerability in Spring Framework
April 1, 2022 — Cyberattacks & exploits Spring4Shell: zero-day vulnerability in Spring Framework

General information Two RCEs exist and three vectors are being discussed online (one of...

Attacks on government authorities by cyberwarfare likely to increase
March 17, 2022 — Company news Attacks on government authorities by cyberwarfare likely to increase

At the Munich Cyber Security Conference last month, the European Commission...

Subscribe to our newsletter

Filter posts

All Phishing awareness Vulnerability management
    • Network Security
    • Web Application Security
    • CVSS
    • Company news
    • Agent-based scanning
    • Laws & regulations
    • Penetration testing
  • 1
  • 2
Platform
System & Network Security Web Application Security Cloud Security API Security Phishing Simulation & Awareness Training
Solutions
Vulnerability management Attack Surface Management (ASM) External Attack Surface Management (EASM) Automated penetration testing
Take the next step
Pricing Free trial Quote Demonstration/meeting
Industries
Aviation Digital infrastructure Education Energy Financial services Food Government agencies Healthcare Manufacturing & production Municipality Transport Real estate Retail & e-commerce Shipping & maritime Water supply
Professional services
Certification Program Success Program
Compliance
NIS & NIS2 Directive DORA ISO 27001 PCI DSS GDPR
Resources
Blog Resources
Partner
Become a partner Partner sign-up
Company
Contact Join us Management team Our story Press kit
Login
Security Center Organizer Partner Portal
Badges_white
Holm Security Yellow
© 2025 All rights reserved
Follow us on LinkedIn Follow us on YouTube Contact us