The Schrems II ruling disqualifies the transfer and processing of personal data from EU...
Since the start, Holm Security has had a vision of becoming a cornerstone in a modern...
So far it can be said that the Zoom team has reacted very quickly to the criticism and discoveries. As with other services, such updates will not resolve every...
As soon as we catch our breath and start to recover from the COVID-19 pandemic, organizations worldwide will evaluate their crisis preparedness. A plenitude of...
Airtel, India’s largest integrated telecommunications company, and Holm Security have entered into a partnership to offer Managed Security Services (MSS) to...
Password Spraying & Credential Stuffing An often recurring question I get asked is: “When do you think passwords will disappear?” Whatever we do, we will have...
At Holm Security, we provide solutions for vulnerability assessment. In meetings with our customers, we sometimes discuss previous incidents that could've...
The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or reaches the right client, hardware, or network. The delivery can be done...