• NIS2 compliance
    • Knowledge base
      • The NIS & NIS2 Directives
      • New in the NIS2 Directive
      • NIS2 sectors overview
      • Risk management requirements
      • Supply chain security requirements
      • Cyber hygiene requirements
      • 11 steps to compliance
      • Frequently asked questions
    • Resources
      • NIS2 Resource Guide
      • Upgrade Your Defense To Comply with NIS2
      • How the NIS2 Cyber Security Directive Will Impact You
      • NIS2 Local Resources
      • NIS2 in Norway
    • We support compliance
      • How we support NIS & NIS2 compliance
      • Automated & continuous risk assessments
      • Compliance packages for NIS & NIS2
      • Free NIS & NIS2 consultation
      • Book a platform demo
  • Platform
    • Solutions
      • Vulnerability management
      • Attack Surface Management (ASM)
      • External Attack Surface Management (EASM)
      • Automated penetration testing
    • Products
      • System & Network Security
      • Web Application Security
      • Cloud Security (CSPM)
      • API Security
      • Phishing Simulation & Awareness Training
    • Compliance
      • NIS & NIS2
      • DORA
      • ISO 27001
      • PCI DSS
      • GDPR
    • Pricing
    • Free trial
    • Quote
    • Request demonstration/meeting
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • Internet of Things
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transportation
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinar
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
Holm Security Yellow
  • Platform
      Solutions
    • Vulnerability management A complete platform for a systematic, risk-based & proactive cyber defense.
    • Attack Surface Management (ASM) Automatically discover and monitor assets throughout your entire attack surface.
    • External Attack Surface Management (EASM) Automatically discover and monitor internet and web-facing assets.
    • Penetration testing Automated penetration testing, including vulnerability management & ASM.
    • Products
    • System & Network Security Assessment of system/server, computers, network equipment, OT, cloud infra, IoT, and devices.
    • Web Application Security Advanced scanning of modern web applications.
    • Cloud Security (CSPM) Assessment of cloud-native platforms Azure, AWS, Google, and Oracle Cloud.
    • API Security Scanning of all types of REST, GraphQL, and SOAP APIs.
    • Phishing Simulation & Awareness Training Phishing simulation, awareness programs, and questionnaires.
    • Compliance
    • NIS2 logo NIS & NIS2 Platform for NIS and NIS2 compliance.
    • DORA_badge DORA Risk assessments for financial institutes.
    • ISO 27001 logo-1 ISO 27001 Risk assessments for ISO 27001 compliance.
    • PCI DSS_logo PCI DSS ASV for PCI DSS version 4.0 compliance.
    • GDPR logo GDPR Platform to protect personal data.
    • Holm Security VMP
      HOLM SECURITY VMP

      The complete platform for a systematic, risk-based, and proactive cyber defense.

      Pricing Request a quote
  • Solutions
    • Attack vectors
      • Business critical systems
      • Web applications
      • Cloud security
      • OT security
      • IoT (Internet of Things)
      • APIs
      • Employees
      • Remote workforce
      • Office networks & equipment
    • Threat vectors
      • Ransomware
      • Software vulnerabilities
      • Phishing & social engineering
      • Cloud misconfigurations
      • Data leakage
      • DDoS attacks
      • Supply chain attacks
    • Compliance
      • NIS & NIS2 Directives
      • DORA
      • ISO 27001
      • PCI DSS
      • CRA
      • GDPR
    • Industries
      • Aviation
      • Digital infrastructure
      • Education
      • Energy
      • Financial services
      • Food
      • Government agencies
      • Healthcare
      • Manufacturing & production
      • Municipalities
      • Transport
      • Real estate
      • Retail & e-commerce
      • Shipping
      • Water supply
  • Services
    • Certification Programs
    • Success Programs
  • Resources
    • Blog
    • Case studies
    • Fundamentals
      • Vulnerability management
      • Next-Gen Vulnerability Management
      • Phishing awareness
    • Video library
    • Webinars
    • Whitepapers
  • Support
  • Partner
    • Become a partner
    • Partner sign-up
  • Company
    • About us
    • Contact
    • Join us
    • Management team
    • Press kit
sv
en Global
fr-be Belgium
da Denmark
fi Finland
de-de Germany
en-my Malaysia
nl Netherlands
no Norway
poland Poland
sv Sweden
en-gb UK
in India
uae Middle East
    • Security Center
    • Organizer
    • Partner Portal
Free trial

Blogg

  • 1
  • 2
Sårbarhetsanalyser & penetrationstester – så kombinerar du november 26, 2018 — Pentestning Sårbarhetsanalyser & penetrationstester – så kombinerar du Vad är vad och hur kan dessa två metoder fungera tillsammans för bästa möjliga resultat. Holm Security reder ut begreppen. Sårbarhetsanalyser och penetrationstester är båda mycket viktiga inslag för att upprätthålla en hög IT-säkerhet i din organisation. Men...
Regeringen: viktiga myndigheter skall utvärdera sin IT-säkerhet
augusti 10, 2017 — Regeringsbeslut Regeringen: viktiga myndigheter skall utvärdera sin IT-säkerhet

29 juni gick regeringen ut med ett uppdrag till samtliga bevakningsansvariga myndigheter....

Subscribe to our newsletter

Filter posts

All Hackerattacker Trender Lagar & Rekommendationer
  • 1
  • 2
Platform
System & Network Security Web Application Security Cloud Security API Security Phishing Simulation & Awareness Training
Solutions
Vulnerability management Attack Surface Management (ASM) External Attack Surface Management (EASM) Automated penetration testing
Take the next step
Pricing Free trial Quote Demonstration/meeting
Industries
Aviation Digital infrastructure Education Energy Financial services Food Government agencies Healthcare Manufacturing & production Municipality Transport Real estate Retail & e-commerce Shipping & maritime Water supply
Professional services
Certification Program Success Program
Compliance
NIS & NIS2 Directive DORA ISO 27001 PCI DSS GDPR
Resources
Blog Resources
Partner
Become a partner Partner sign-up
Company
Contact Join us Management team Our story Press kit
Login
Security Center Organizer Partner Portal
Badges_white
Holm Security Yellow
© 2025 All rights reserved
Follow us on LinkedIn Follow us on YouTube Contact us