

You know what a pen test is, but why do you need it? Businesses are digitizing at a rapid...
In today’s rapidly evolving threat landscape, maintaining a robust vulnerability...
You have probably heard of it. Maybe you’re already using it. Attack Surface Management...
There's a lot of buzz around SOCs At Holm Security, we meet with thousands of organizations every year. A clear trend is that more and more organizations are...
A constantly growing challenge in an evolving threat landscape Today, technological advancements and digitalization introduce new challenges and a constantly...
Systematic & risk-based = proactive cyber defense When analyzing the key purpose of NIS and NIS2, you will soon understand that a proactive cyber defense is...
We’ve recently done a pen test of our infrastructure Pen tests are a great step in securing your business. While penetration testing is complementary to...
The drawbacks of traditional vulnerability management Traditional vulnerability management is the process of identifying, assessing, and addressing...
What is Shadow IT? Before the cloud, enterprise employees could access only systems or applications made available by IT, which procured and managed packaged...