

At the Munich Cyber Security Conference last month, the European Commission...
“The global cyber security market is experiencing rapid growth as businesses need to fend...
Holm Security has appointed leading UK-based public relations and digital marketing...
This vulnerability can allow an attacker to gain complete control over entire systems if exploited on a server. Any system that could be exploited should be...
We're proud to report that Holm Security is featured in the recent edition of Gartner's Voice of the Customer report. This success lies in our ability to...
Achieving visibility into all vulnerabilities across all ecosystems is challenging, something cybercriminals are capitalizing on by exploiting weaknesses in...
Pentesting and intrusion testing utilize software platforms built to scan and identify network issues. These issues could be anything from open ports which...
One of the work packages under the GN4-3 is focusing on cyber security to help not least universities in Europe strengthen their cyber security defense. David...
"Just over two years ago, we started an almost impossible project; to find the best entrepreneur within SaaS in Sweden. We started looking for a person who has...