Alok Sahay Country Manager India Saarc

Alok Sahay
Sales Director India & SAARC
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

Faurani Ahmad Sales director Southeast Asia

Ahmad Faurani
Sales Director Southeast Asia
ahmad.faurani@holmsecurity.com
+60 19 434 2727

Welcome to Malaysia!

Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

cristian-miranda-holm-security

Cristian Miranda
Key Account Manager, Finland
cristian.miranda@holmsecurity.com
+46 8-550 05 582

Tervetuloa!

Hei! Nimeni on Cristian ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? 

Ota yhteyttä

victor-bunge-meyer-holm-security

Victor Bunge Meyer
Key Account Manager, Sverige
victor.bunge-meyer@holmsecurity.com
+46 08-550 05 582

Holm Security i Sverige

Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vår platform för sårbarhetsanalyser. 

Kontakta oss

 

 

Beth Murrell holm security

Beth Murrell
Account Manager, Benelux
elizabeth.murrell@holmsecurity.com
+31-20-238 63 94

Welkom in de Benelux!

Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!

Neem contact op

jens dahlkvist holm security

Jens Dahlkvist
Key Account Manager, Norge
jens.dahlkvist@holmsecurity.com
+46 8-550 05 582

Holm Security i Norge

Velkommen til Holm Security i Norge! Jeg heter Jens og er din lokale kontaktperson.Kontakt meg hvis du vil vite mer om vår plattform for sårbarhetsanalyser.

Kontakt oss

Ronnie Jensen

Ronnie Jensen
Country Manager Denmark
ronnie.jensen@holmsecurity.com
+45 31 12 10 05

Holm Security i Danmark

Velkommen til Holm Security i Danmark! Mit navn er Ronnie og jeg er din lokale kontaktperson. Kontakt mig, hvis du vil vide mere om vores sårbarhedsanalyseplatform.

Kontakt os

Cyber security predictions 2019

Image of Jonas Lejon
Jonas Lejon

January 30, 2019

There’s no question about it, the number of cybersecurity-related threats is increasing drastically and cyber crimes are becoming more and more advanced which makes them more complex to fight. During 2018 we have seen some trends on a relatively small scale. We believe that some of these trends will increase in scale in 2019. Here are our cyber security predictions for 2019. Stay safe!

Web scraping of credit cards

Last year, several different e-retailers' credit card forms, on their web pages, were hijacked. Where JavaScript was injected, reading the credit card information.

We all know that thieves follow the money and we will most probably see more attacks in the chain before the credit card provider authentications being attacked or replaced by an attacker's fictitious form.

Active defense

More people realize that active and fast action is crucial in preventing an attacker from gaining ground in an organization. Therefore, more products and systems appear that can prevent an attacker from escalating their rights or moving within the network (lateral movement). But to make rapid countermeasures, of course, the attacker must first and foremost be discovered, which places demands on traceability and logging.

An active defense can also involve introducing honey traps and systems that are virtualized but not part of the real network or planting information that confuses the attacker or leads it into the wrong track and causes incorrect conclusions to be drawn.

Artificial Intelligence

Will 2019 be the year where we will see real AI within cyber security? Many security products we use every day have relatively little AI built-in and there is probably a huge development potential where cyber security meets AI. Imagine for example Nmap with a little intelligence? Instead of only scanning the 1.000 most common ports that a system exposes, dynamic ports are also added based on those identified.

Vulnerable products

In recent years, we have seen that connected products, like IoT, contain vulnerabilities and can be used to attack others by, for example, being part of a bot network. However, what we have seen less of is how the gadgets' functions can be used for malicious purposes to a great extent. In this area, I believe we will see more and more startling cyber attacks, let’s just hope they don’t affect people's lives.

Net fishing & multi-factor authentication

As an increasing amount of logins are done using multifactor authentication (MFA), tools and methods are also being developed to attack multifactor authentication. With a targeted email message lurking a user, the attacker can bypass multi-factor authentication and escalate their rights and become the domain administrator on the organization's network in just a few minutes. It’s no longer a fictitious scenario but something that is performed both by malicious attackers and by Red Team exercises where companies are hired to test the security.

Cyber Security Starts Here!

Holm Security delivers unparalleled 360-degree coverage and comprehensive insight to enable you to detect vulnerabilities, assess risk, and prioritize remediation for every asset in your entire infrastructure. We provide an all-in-one platform, covering three layers, with all the tools you need - regardless if you’re consolidating or implementing Vulnerability Management for the first time.

Book my free demo