

In its newlyreleased Technical Implementation Guide, ENISA clearly addressesvulnerability...
Notice: This is a critical vulnerability only found in SharePoint running on-prem. Two...
Wishing you a happy & secure summer from all of us at Holm Security! As the days get...
Ransomware has grown to become today’s most feared cyber threat, having not only increased in number but also more advanced in targeting. The global cost for...
Most organizations outsource their security, engaging external service providers or vendors to manage IT infrastructure and IT-related services. It is no...
The DORA regulation and the NIS2 Directive are both important parts of the EU’s cyber security strategy. They complement each other: DORA aims to ensure the...
You have probably heard of it. Maybe you’re already using it. Attack Surface Management (ASM) and External Attack Surface Management (EASM) are popular cyber...
The Cyber Resilience Act (CRA) is the first regulation of its kind globally, making product cyber security mandatory. Unlike the NIS2 Directive, which needs to...
There’s a lot of buzz about AI these days. This is not that strange, as AI is a fast-emerging technology, but we’ve already seen it used to support or carry...