• NIS2 compliance
    • Knowledge base
      • The NIS & NIS2 Directives
      • New in the NIS2 Directive
      • NIS2 sectors overview
      • Risk management requirements
      • Supply chain security requirements
      • Cyber hygiene requirements
      • 11 steps to compliance
      • Frequently asked questions
    • Resources
      • NIS2 Resource Guide
      • Upgrade Your Defense To Comply with NIS2
      • How the NIS2 Cyber Security Directive Will Impact You
      • NIS2 Local Resources
      • NIS2 in Norway
    • We support compliance
      • How we support NIS & NIS2 compliance
      • Automated & continuous risk assessments
      • Compliance packages for NIS & NIS2
      • Free NIS & NIS2 consultation
      • Book a platform demo
  • Platform
    • Solutions
      • Vulnerability management
      • Attack Surface Management (ASM)
      • External Attack Surface Management (EASM)
      • Automated penetration testing
    • Products
      • System & Network Security
      • Web Application Security
      • Cloud Security (CSPM)
      • API Security
      • Phishing Simulation & Awareness Training
    • Compliance
      • NIS & NIS2
      • DORA
      • ISO 27001
      • PCI DSS
      • GDPR
    • Pricing
    • Free trial
    • Quote
    • Request demonstration/meeting
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • Internet of Things
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transportation
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinar
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
Holm Security Yellow
  • Platform
      Solutions
    • Vulnerability management A complete platform for a systematic, risk-based & proactive cyber defense.
    • Attack Surface Management (ASM) Automatically discover and monitor assets throughout your entire attack surface.
    • External Attack Surface Management (EASM) Automatically discover and monitor internet and web-facing assets.
    • Automated penetration testing Automated penetration testing, including vulnerability management & ASM.
    • Products
    • System & Network Security Assessment of system/server, computers, network equipment, OT, cloud infra, IoT, and devices.
    • Web Application Security Advanced scanning of modern web applications.
    • Cloud Security (CSPM) Assessment of cloud-native platforms Azure, AWS, Google, and Oracle Cloud.
    • API Security Scanning of all types of REST, GraphQL, and SOAP APIs.
    • Phishing Simulation & Awareness Training Phishing simulation, awareness programs, and questionnaires.
    • Compliance
    • NIS2 logo NIS & NIS2 Platform for NIS and NIS2 compliance.
    • DORA_badge DORA Risk assessments for financial institutes.
    • ISO 27001 logo-1 ISO 27001 Risk assessments for ISO 27001 compliance.
    • PCI DSS_logo PCI DSS ASV for PCI DSS version 4.0 compliance.
    • GDPR logo GDPR Platform to protect personal data.
    • Holm Security VMP
      HOLM SECURITY VMP

      The complete platform for a systematic, risk-based, and proactive cyber defense.

      Pricing Request a quote
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • IoT (Internet of Things)
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transport
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinars
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
en
en Global
fr-be Belgium
da Denmark
fi Finland
de-de Germany
en-my Malaysia
nl Netherlands
no Norway
poland Poland
sv Sweden
en-gb UK
in India
uae Middle East
    • Security Center
    • Organizer
    • Partner Portal
Free trial

Vulnerability management (3)

  • 1
  • 2
  • 3
How does a security assessment work? February 1, 2021 — Vulnerability management How does a security assessment work? Security assessments are carried out by individuals who are unclear as to the quality of the security measures put in place on their IT systems and networks. The benefits of a secure network are many and include the security measure's ability to protect user...
What is Web Application Security?
January 30, 2021 — Web Application Security What is Web Application Security?

What is Web Application Security? Website security is used for a few reasons. A reason...

Cyber security in the cloud
January 24, 2021 — System & Network Security Cyber security in the cloud

What is it? Cyber security in the cloud is a term that describes a service that is being...

What is security scanning?
January 12, 2021 — Vulnerability management What is security scanning?

The type of security scanning required for a particular system depends on what that...

Subscribe to our newsletter

Filter posts

All Phishing awareness Vulnerability management
    • Network Security
    • Web Application Security
    • CVSS
    • Company news
    • Agent-based scanning
    • Laws & regulations
    • Penetration testing
Outsourcing & vulnerability assessment – a perfect combo November 26, 2018 — Vulnerability management Outsourcing & vulnerability assessment – a perfect combo

You’re still responsible when outsourcing A common misconception is that outsourcing means that the liability for, as an example, personal data in relation to...

  • 1
  • 2
  • 3
Platform
System & Network Security Web Application Security Cloud Security API Security Phishing Simulation & Awareness Training
Solutions
Vulnerability management Attack Surface Management (ASM) External Attack Surface Management (EASM) Automated penetration testing
Take the next step
Pricing Free trial Quote Demonstration/meeting
Industries
Aviation Digital infrastructure Education Energy Financial services Food Government agencies Healthcare Manufacturing & production Municipality Transport Real estate Retail & e-commerce Shipping & maritime Water supply
Professional services
Certification Program Success Program
Compliance
NIS & NIS2 Directive DORA ISO 27001 PCI DSS GDPR
Resources
Blog Resources
Partner
Become a partner Partner sign-up
Company
Contact Join us Management team Our story Press kit
Login
Security Center Organizer Partner Portal
Badges_white
Holm Security Yellow
© 2025 All rights reserved
Follow us on LinkedIn Follow us on YouTube Contact us