As complex and exceptionally powerful systems, mainframes significantly exceed the capacities of a typical PC or server. Particularly in industries...
Pentests & Security Analyses
usd HeroLab Top 5 Vulnerabilities 2020: Transport Layer Security (TLS) 1.0
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
usd HeroLab Top 5 Vulnerabilities 2020: SQL Injection
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant...
usd AG Again Accredited as Worldwide Approved Scanning Vendor (ASV)
"A few days ago we again received the worldwide accreditation as Approved Scanning Vendor (ASV) with our usd PCI DSS Platform and our ASV Scanning...
usd HeroLab Top 5 Vulnerabilities 2020: Broken Access Control
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
usd HeroLab Top 5 Vulnerabilities 2020: Cross-Site Scripting (XSS)
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
Next Level Pentesting: Why the classic pentest approach is reaching its limits
For more than 25 years, we have been helping companies achieve more security and monitoring developments and trends. In this interview...
usd HeroLab Annual Report 2020: Risks. Consequences. More Security
2020 was a year of special threats – even in the world of IT security. The HeroLab Annual Report reviews the year from the perspective of our...
What You Should Consider When Ordering Pentests
Penetration tests, or pentests for short, are one of the most important IT security measures that companies can conduct proactively to...
Get started with planning your pentest with these 4 questions
Planning penetration tests, or pentests for short, can become very complex at times. In the following, we provide you with tips that have proven to...
More Security for Patient Data: Pentest and Cloud Audit at medavis
Compliance requirements are often the driving force behind the necessity of a pentest. However, each company and its IT infrastructure has to...
usd OrangeBox makes remote pentests simple
Many companies ask themselves whether attackers are able to compromise their IT infrastructure. Pentests provide reliable results to this...