The type of security scanning required for a particular system depends on what that...
The Schrems II ruling disqualifies the transfer and processing of personal data from EU...
As soon as we catch our breath and start to recover from the COVID-19 pandemic,...
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as...
In Security Center, customers can manage their assets and work with their vulnerabilities. With Organizer, we create an overlying layer that enables you to...
You’re Still Responsible When Outsourcing A common misconception is that outsourcing means that the liability for, as an example, personal data in relation to...
Holm Security discovered a vulnerability in EPiServer’s SiteSeeker product. The vulnerability means that JavaScript in affected web pages can be modified to...