• NIS2 compliance
    • Knowledge base
      • The NIS & NIS2 Directives
      • New in the NIS2 Directive
      • NIS2 sectors overview
      • Risk management requirements
      • Supply chain security requirements
      • Cyber hygiene requirements
      • 11 steps to compliance
      • Frequently asked questions
    • Resources
      • NIS2 Resource Guide
      • Upgrade Your Defense To Comply with NIS2
      • How the NIS2 Cyber Security Directive Will Impact You
      • NIS2 Local Resources
      • NIS2 in Norway
    • We support compliance
      • How we support NIS & NIS2 compliance
      • Automated & continuous risk assessments
      • Compliance packages for NIS & NIS2
      • Free NIS & NIS2 consultation
      • Book a platform demo
  • Platform
    • Solutions
      • Vulnerability management
      • Attack Surface Management (ASM)
      • External Attack Surface Management (EASM)
      • Automated penetration testing
    • Products
      • System & Network Security
      • Web Application Security
      • Cloud Security (CSPM)
      • API Security
      • Phishing Simulation & Awareness Training
    • Compliance
      • NIS & NIS2
      • DORA
      • ISO 27001
      • PCI DSS
      • GDPR
    • Pricing
    • Free trial
    • Quote
    • Request demonstration/meeting
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • Internet of Things
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transportation
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinar
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
Holm Security Yellow
  • Platform
      Solutions
    • Vulnerability management A complete platform for a systematic, risk-based & proactive cyber defense.
    • Attack Surface Management (ASM) Automatically discover and monitor assets throughout your entire attack surface.
    • External Attack Surface Management (EASM) Automatically discover and monitor internet and web-facing assets.
    • Penetration testing Automated penetration testing, including vulnerability management & ASM.
    • Products
    • System & Network Security Assessment of system/server, computers, network equipment, OT, cloud infra, IoT, and devices.
    • Web Application Security Advanced scanning of modern web applications.
    • Cloud Security (CSPM) Assessment of cloud-native platforms Azure, AWS, Google, and Oracle Cloud.
    • API Security Scanning of all types of REST, GraphQL, and SOAP APIs.
    • Phishing Simulation & Awareness Training Phishing simulation, awareness programs, and questionnaires.
    • Compliance
    • NIS2 logo NIS & NIS2 Platform for NIS and NIS2 compliance.
    • DORA_badge DORA Risk assessments for financial institutes.
    • ISO 27001 logo-1 ISO 27001 Risk assessments for ISO 27001 compliance.
    • PCI DSS_logo PCI DSS ASV for PCI DSS version 4.0 compliance.
    • GDPR logo GDPR Platform to protect personal data.
    • Holm Security VMP
      HOLM SECURITY VMP

      The complete platform for a systematic, risk-based, and proactive cyber defense.

      Pricing Request a quote
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • IoT (Internet of Things)
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transport
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinars
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
en
en Global
fr-be Belgium
da Denmark
fi Finland
de-de Germany
en-my Malaysia
nl Netherlands
no Norway
poland Poland
sv Sweden
en-gb UK
in India
uae Middle East
    • Security Center
    • Organizer
    • Partner Portal
Free trial

Security trends

AI & cyber security - should I be concerned? January 24, 2025 — Security trends AI & cyber security - should I be concerned? There’s a lot of buzz about AI these days. This is not that strange, as AI is a fast-emerging technology, but we’ve already seen it used to support or carry out cyberattacks. You might be wondering to what extent your organization should be concerned about...
Security risks working from home
May 13, 2020 — Security trends Security risks working from home

6 tips for safer zoom video conferences
April 16, 2020 — Security trends 6 tips for safer zoom video conferences

So far it can be said that the Zoom team has reacted very quickly to the criticism and...

Cyber security predictions 2020
January 17, 2020 — Security trends Cyber security predictions 2020

Password spraying & credential stuffing An often recurring question I get asked is: “When...

Subscribe to our newsletter

Filter posts

All Phishing awareness Vulnerability management
    • Network Security
    • Web Application Security
    • CVSS
    • Company news
    • Agent-based scanning
    • Laws & regulations
    • Penetration testing
Cyber security predictions in 2019 January 30, 2019 — Security trends Cyber security predictions in 2019

Web scraping of credit cards Last year, several different e-retailers' credit card forms, on their web pages, were hijacked. Where JavaScript was injected,...

Platform
System & Network Security Web Application Security Cloud Security API Security Phishing Simulation & Awareness Training
Solutions
Vulnerability management Attack Surface Management (ASM) External Attack Surface Management (EASM) Automated penetration testing
Take the next step
Pricing Free trial Quote Demonstration/meeting
Industries
Aviation Digital infrastructure Education Energy Financial services Food Government agencies Healthcare Manufacturing & production Municipality Transport Real estate Retail & e-commerce Shipping & maritime Water supply
Professional services
Certification Program Success Program
Compliance
NIS & NIS2 Directive DORA ISO 27001 PCI DSS GDPR
Resources
Blog Resources
Partner
Become a partner Partner sign-up
Company
Contact Join us Management team Our story Press kit
Login
Security Center Organizer Partner Portal
Badges_white
Holm Security Yellow
© 2025 All rights reserved
Follow us on LinkedIn Follow us on YouTube Contact us