

Until fairly recently, the concept of ongoing, continual monitoring of a network seemed...
The type of security scanning required for a particular system depends on what that...
The Schrems II ruling disqualifies the transfer and processing of personal data from EU...
Since the start, Holm Security has had a vision of becoming a cornerstone in a modern cyber security defense, available for the masses. 5 years later we have...
As soon as we catch our breath and start to recover from the COVID-19 pandemic, organizations worldwide will evaluate their crisis preparedness. A plenitude of...
Airtel, India’s largest integrated telecommunications company, and Holm Security have entered into a partnership to offer Managed Security Services (MSS) to...
Holm Security continues to expand in Asia and is now opening a sales office in New Delhi, India. The office in India covers a large part of the region, which...
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as...
According to Stefan Thelberg, security expert and CEO at Holm Security, the 1177 leak could have easily been avoided if basic security measures had been in...