CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Välkommen till Holm Security!

Vi guidar dig genom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Läs mer här

Boka demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to UK!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Alok Sahay Country Manager India Saarc

Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India.

Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Norge!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Malaysia

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

Hacker attacks

Are you protected against malware attacks?

Imagine this, one day you discover that your website is being used to propagate malware. Google...

Oct 3, 2019

Hacker attacks

How a cyber weapon is made

What is the difference between an ordinary damaging code and an advanced cyber weapon, and...

Aug 29, 2019

Hacker attacks

How hackers use legitimate-looking domains to attack you

Hackers use multiple techniques of manipulation to trick you into opening a malicious website....

Jun 17, 2019

Hacker attacks

The Hydro-attack cost 350 million – this is how it happened!

On March 19, the Norwegian multinational company Norsk Hydro detected abnormal activity in their...

May 22, 2019

Hacker attacks

The 1177 leak could have easily been avoided

Recently Sweden experienced its most extensive data leak in history. February 18th the Swedish...

Mar 8, 2019

Hacker attacks

10 different ways an attacker can put in backdoors in IT systems

Understanding an attacker and the various methods used for attempting to access or modify...

Oct 2, 2018