<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Resources</title>
    <link>https://www.holmsecurity.com/resources</link>
    <description>Dive into the latest insights within vulnerability management, Phishing Simulation &amp; Awareness Training, cyber security, and more.</description>
    <language>en</language>
    <pubDate>Mon, 22 Dec 2025 15:31:22 GMT</pubDate>
    <dc:date>2025-12-22T15:31:22Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Cyber security for sports betting &amp; online casino operators</title>
      <link>https://www.holmsecurity.com/resources/cyber-security-for-sports-betting-online-casino-operators</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/cyber-security-for-sports-betting-online-casino-operators" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinars%20IV%20page.png" alt="Cyber security for sports betting &amp;amp; online casino operators" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/cyber-security-for-sports-betting-online-casino-operators" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinars%20IV%20page.png" alt="Cyber security for sports betting &amp;amp; online casino operators" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fcyber-security-for-sports-betting-online-casino-operators&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Mon, 22 Dec 2025 15:31:22 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/cyber-security-for-sports-betting-online-casino-operators</guid>
      <dc:date>2025-12-22T15:31:22Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>Learn about Sweden's Cybersecurity Act of 2026</title>
      <link>https://www.holmsecurity.com/resources/cybers%C3%A4kerhetslagen-2026</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/cybersäkerhetslagen-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinar%20and%20events/Webinars%20and%20recordings/Delphi%20LP%20image.png" alt="Learn about Sweden's Cybersecurity Act of 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/cybersäkerhetslagen-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinar%20and%20events/Webinars%20and%20recordings/Delphi%20LP%20image.png" alt="Learn about Sweden's Cybersecurity Act of 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fcybers%C3%A4kerhetslagen-2026&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Mon, 10 Nov 2025 12:47:16 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/cybers%C3%A4kerhetslagen-2026</guid>
      <dc:date>2025-11-10T12:47:16Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>NIS2 Reference Guide: Securing critical infrastructure</title>
      <link>https://www.holmsecurity.com/resources/nis2-reference-guide</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/nis2-reference-guide" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/NIS2%20Guide%20social%20image.png" alt="NIS2 Reference Guide: Securing critical infrastructure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/nis2-reference-guide" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/NIS2%20Guide%20social%20image.png" alt="NIS2 Reference Guide: Securing critical infrastructure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fnis2-reference-guide&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Whitepaper</category>
      <pubDate>Tue, 09 Apr 2024 08:29:41 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/nis2-reference-guide</guid>
      <dc:date>2024-04-09T08:29:41Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>Upgrade your cyber defense to prepare for NIS2 - a step-by-step guide</title>
      <link>https://www.holmsecurity.com/resources/prepare-for-nis2-guide</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/prepare-for-nis2-guide" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Website/Images/Blog/NIS2%20How%20will%20it%20affect%20your%20business.webp" alt="NIS2 EU Flag" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/prepare-for-nis2-guide" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Website/Images/Blog/NIS2%20How%20will%20it%20affect%20your%20business.webp" alt="NIS2 EU Flag" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fprepare-for-nis2-guide&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Fri, 08 Sep 2023 12:47:38 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/prepare-for-nis2-guide</guid>
      <dc:date>2023-09-08T12:47:38Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>PCI DSS 4.0 NEW Standards That Could Shut-Off Your E-Commerce Business</title>
      <link>https://www.holmsecurity.com/resources/business-risks-pci-dss-4</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/business-risks-pci-dss-4" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Payments%20contactless%20resize.png" alt="customer payment using contactless pci dss" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/business-risks-pci-dss-4" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Payments%20contactless%20resize.png" alt="customer payment using contactless pci dss" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fbusiness-risks-pci-dss-4&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Wed, 28 Jun 2023 11:39:07 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/business-risks-pci-dss-4</guid>
      <dc:date>2023-06-28T11:39:07Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>Simplifying Vulnerability Management: Unification in Action</title>
      <link>https://www.holmsecurity.com/resources/unification-removes-complexity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/unification-removes-complexity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinar%20and%20events/Webinars%20and%20recordings/How%20Unification%20Removes%20Complexity%20Webinar/Unification%20Removes%20Complexity%20signature.png" alt="Simplifying Vulnerability Management: Unification in Action" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/unification-removes-complexity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinar%20and%20events/Webinars%20and%20recordings/How%20Unification%20Removes%20Complexity%20Webinar/Unification%20Removes%20Complexity%20signature.png" alt="Simplifying Vulnerability Management: Unification in Action" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Funification-removes-complexity&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Fri, 26 May 2023 13:37:53 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/unification-removes-complexity</guid>
      <dc:date>2023-05-26T13:37:53Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>How Increased Attack Vector Coverage Improves Your Cyber Defence</title>
      <link>https://www.holmsecurity.com/resources/complete-asset-coverage</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/complete-asset-coverage" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinar%20and%20Events/Webinars/Complete%20Asset%20Coverage/Attack-Vector%202%20%282%29.png" alt="How Increased Attack Vector Coverage Improves Your Cyber Defence" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/complete-asset-coverage" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Webinar%20and%20Events/Webinars/Complete%20Asset%20Coverage/Attack-Vector%202%20%282%29.png" alt="How Increased Attack Vector Coverage Improves Your Cyber Defence" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fcomplete-asset-coverage&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Thu, 04 May 2023 15:36:22 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/complete-asset-coverage</guid>
      <dc:date>2023-05-04T15:36:22Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>Cloud Risk Mitigation: Mastering CSPM for Enhanced Security</title>
      <link>https://www.holmsecurity.com/resources/customer-tutorial-cloud-scanning</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/customer-tutorial-cloud-scanning" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Website/Images/Webinar/Cloud%20computing%20and%20Big%20data%20concept.webp" alt="Cloud Risk Mitigation: Mastering CSPM for Enhanced Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; null</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/customer-tutorial-cloud-scanning" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Website/Images/Webinar/Cloud%20computing%20and%20Big%20data%20concept.webp" alt="Cloud Risk Mitigation: Mastering CSPM for Enhanced Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; null  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fcustomer-tutorial-cloud-scanning&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Wed, 19 Apr 2023 09:49:12 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/customer-tutorial-cloud-scanning</guid>
      <dc:date>2023-04-19T09:49:12Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>Guarding Your Assets with Increased Attack Vector Coverage</title>
      <link>https://www.holmsecurity.com/resources/guarding-your-assets</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/guarding-your-assets" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Attack%20Vector%20Featured%20Image.png" alt="Guarding Your Assets with Increased Attack Vector Coverage" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/guarding-your-assets" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Attack%20Vector%20Featured%20Image.png" alt="Guarding Your Assets with Increased Attack Vector Coverage" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Fguarding-your-assets&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Wed, 15 Mar 2023 09:25:06 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/guarding-your-assets</guid>
      <dc:date>2023-03-15T09:25:06Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
    <item>
      <title>DEBATE: Traditional Vulnerability Management is Dead - What Next?</title>
      <link>https://www.holmsecurity.com/resources/traditional-vulnerability-management-dead</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/traditional-vulnerability-management-dead" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Website/Images/Webinar/traditonal%20vulnerability%20management.webp" alt="DEBATE: Traditional Vulnerability Management is Dead - What Next?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.holmsecurity.com/resources/traditional-vulnerability-management-dead" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.holmsecurity.com/hubfs/Website/Images/Webinar/traditonal%20vulnerability%20management.webp" alt="DEBATE: Traditional Vulnerability Management is Dead - What Next?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8614076&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.holmsecurity.com%2Fresources%2Ftraditional-vulnerability-management-dead&amp;amp;bu=https%253A%252F%252Fwww.holmsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinar</category>
      <pubDate>Fri, 27 Jan 2023 16:30:01 GMT</pubDate>
      <guid>https://www.holmsecurity.com/resources/traditional-vulnerability-management-dead</guid>
      <dc:date>2023-01-27T16:30:01Z</dc:date>
      <dc:creator>Holm Security</dc:creator>
    </item>
  </channel>
</rss>
