Hacker attacks & exploits

Spring4Shell: Zero-Day Vulnerability in Spring Framework

Holm Security is sharing the following vulnerability update in relation to Spring4Shell. The...

Apr 1, 2022

Vulnerability Management

6 Reasons an Agent is Crucial for Your Cyber Security Defense

Traditional vulnerability management is a cornerstone in modern cyber security defense. The success...

Mar 22, 2022

Hacker attacks & exploits

How to remediate the Log4j 2 vulnerability

On Friday the 10th of December, a new widespread vulnerability impacting the Apache Log4j version 2...

Dec 14, 2021

Vulnerability Management

Vulnerability Management Program - 10 Ways to Improve Your Security

Thousands of new vulnerabilities are discovered annually, requiring organizations to patch software...

Nov 5, 2021

Vulnerability Management

Vulnerability assessment

What is it?

Vulnerability assessment provides an objective overview of how susceptible your systems...

May 6, 2021

Vulnerability Management

5 Steps to Successful Vulnerability Management

Vulnerability Management is a cornerstone in modern cyber security defense. But getting started and...

Feb 5, 2021

Vulnerability Management

Security assessment

Security assessments are carried out by individuals who are unclear as to the quality of the...

Feb 1, 2021

Web App Scanning

What is web application security?

Website security is an important part of doing business online. Your business can involve money or...

Jan 30, 2021

Penetration testing

How to combine vulnerability management and penetration testing

What is what and how are these two methods used together? Holm Security explains the methods....

Jan 27, 2021

System & Network Scanning

Cyber security in the cloud

What is it?

Cyber security in the cloud is a term that describes a service that is being offered by...

Jan 24, 2021

Vulnerability Management

Security scanning

What is it?

Security scanning, or vulnerability scanning, can mean many different things, but it...

Jan 12, 2021

Vulnerability Management

Outsourcing and vulnerability assessment – a perfect combo

More than 70% of all organizations outsource their IT to a greater or lesser extent and it’s...

Nov 26, 2018
Show more ❯