

Wishing you a happy & secure summer from all of us at Holm Security! As the days get...
Ransomware has grown to become today’s most feared cyber threat, having not only...
Most organizations outsource their security, engaging external service providers or...
The DORA regulation and the NIS2 Directive are both important parts of the EU’s cyber security strategy. They complement each other: DORA aims to ensure the...
You have probably heard of it. Maybe you’re already using it. Attack Surface Management (ASM) and External Attack Surface Management (EASM) are popular cyber...
The Cyber Resilience Act (CRA) is the first regulation of its kind globally, making product cyber security mandatory. Unlike the NIS2 Directive, which needs to...
There’s a lot of buzz about AI these days. This is not that strange, as AI is a fast-emerging technology, but we’ve already seen it used to support or carry...
2024 was another very successful year for Holm Security. We made significant product improvements, strengthening our position as the market leader within...
There's a lot of buzz around SOCs At Holm Security, we meet with thousands of organizations every year. A clear trend is that more and more organizations are...