Testimonial
Huddinge municipality is the second-largest municipality in the metropolitan region, with over...
Vulnerability Management
The Schrems II ruling disqualifies the transfer and processing of personal data from EU...
Testimonial
The protection of personal data is one of the most important challenges facing schools and...
Security Tips & Tricks
Remote work has increased drastically and at the same time, there are clear indications that...
Company news
Selected out of thousands of companies, Holm Security was announced winner in the Red Herring...
Testimonial
Cyber security in the food sector is becoming increasingly important. The lack of a clear...
COVID-19
COVID-19 will not only have an impact on our lives in the real world. It will also have a major...
Company news
As a step in establishing in India, Holm Security enters into a partnership with Bharti Airtel,...
Trends
A new year, new vulnerabilities. From appliance hacking to password spraying - our security...
Hacker attacks
Imagine this, one day you discover that your website is being used to propagate malware. Google...
Hacker attacks
What is the difference between an ordinary damaging code and an advanced cyber weapon, and...
Testimonial
Since the start of Holm Security in the Netherlands, a lot of effort has been invested in the...