

There's a lot of buzz around SOCs At Holm Security, we meet with thousands of...
A constantly growing challenge in an evolving threat landscape Today, technological...
Systematic & risk-based = proactive cyber defense When analyzing the key purpose of NIS...
Tackle the “itches” of traditional vulnerability management With a drastically growing remote workforce, many organizations are looking into how to get...
Achieving visibility into all vulnerabilities across all ecosystems is challenging, something cybercriminals are capitalizing on by exploiting weaknesses in...
Pentesting and intrusion testing utilize software platforms built to scan and identify network issues. These issues could be anything from open ports which...
One of the work packages under the GN4-3 is focusing on cyber security to help not least universities in Europe strengthen their cyber security defense. David...
"Just over two years ago, we started an almost impossible project; to find the best entrepreneur within SaaS in Sweden. We started looking for a person who has...
1. Automation & continuity It’s important to understand that vulnerability management is an ongoing and never-ending process. Most organizations don’t have the...