Dig deep into our webinars, designed to help you get to know vulnerability management. Register for an upcoming session or watch our on-demand webinars.
In this webinar, Claus Nielsen and Oskar Åkesson will discuss how to embrace Shadow IT instead of adopting a "Zero Trust" approach.
CVSS scores are commonly used by Information security (InfoSec) teams to provide a point of comparison between vulnerabilities and to prioritize remediation of vulnerabilities. Watch the webinar to learn more.
Together with Sweden's leading cyber security expert Jonas Lejon and Thomas Pålsson crisis strategy specialist, we'll in this webinar look at today's biggest cyber security challenges and the role of the human firewall in a cyber defense strategy.
Learn the most important elements to consider when it comes to adopting a vulnerability management process and why it is a crucial element in protecting your data against cyber-attacks.
Ta del av detta webbinarium för att lära dig mer om nutidens största cybersäkerhetsutmaningar för svensk offentlig sektor.
Together with our UK partner Protecture, we talk about the importance of vulnerability management. Learn how working proactively with automated and continuous vulnerability management can lessen the effects of cyber threats. Learn how smart investments can help you to stay in control and increase your awareness and learn more about the ever-growing cyber threats.
The Log4j zero-day vulnerability (CVE-2021-44228) is a Remote Code Execution (RCE) vulnerability impacting software using Log4j version 2. Log4j is a common open-source logging library for Java-based applications which can be implemented by anyone who chooses to do it. It is considered a critical flaw, with a base CVSS score of 10, the highest possible severity rating.
Want to know how a partnership with Holm Security can help accelerate your business and at the same time improve your customers' cyber security defense? Watch this webinar to learn more.
Watch our recorded webinar, to understand how your organization can benefit from extending your vulnerability management program with a lightweight endpoint agent for systems, computers, and your remote workforce.
Vulnerability Management is the cornerstone in modern cyber security defense. In this webinar, we'll talk about 5 important steps that will help you build a successful Vulnerability Management strategy. This webinar discussed how to adopt a risk-based approach when working with automated and continuous Vulnerability Management.
Transferring personal data to the US under the EU-US Privacy Shield was disqualified based on the Schrems II ruling. But what about other sensitive data? Join and listen to Max Schrems live in this webinar together with our CEO Stefan Thelberg and Peter Ekmark, CEO at Internet Vikings.
Webinar with cyber security and automation expert Henrik Holmboe. Learn how DevSecOps fits with the security landscape and how to take advantage of the use of automation with the Holm Security Platform API. Erik Torlén, CTO at Holm Security, will share how you can use the Platform API to automate vulnerability assessment scanning.
A very interesting webinar about how hackers attack your IT environment. The webinar is 40 minutes and provides useful information for anyone who works with IT regardless of the level of knowledge within IT security.
A live demonstration of a simulated ransomware attack by IT security expert Jonas Lejon. Learn how Holm Security can help you increase resilience against social engineering and ransomware by doing simulated email attacks and tailored and automated education