During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
Pentests & Security Analyses
Next Level Pentesting: Why the classic pentest approach is reaching its limits
For more than 25 years, we have been helping companies achieve more security and monitoring developments and trends. In this interview...
usd HeroLab Annual Report 2020: Risks. Consequences. More Security
2020 was a year of special threats – even in the world of IT security. The HeroLab Annual Report reviews the year from the perspective of our...
What You Should Consider When Ordering Pentests
Penetration tests, or pentests for short, are one of the most important IT security measures that companies can conduct proactively to...
Get started with planning your pentest with these 4 questions
Planning penetration tests, or pentests for short, can become very complex at times. In the following, we provide you with tips that have proven to...
More Security for Patient Data: Pentest and Cloud Audit at medavis
Compliance requirements are often the driving force behind the necessity of a pentest. However, each company and its IT infrastructure has to...
usd OrangeBox makes remote pentests simple
Many companies ask themselves whether attackers are able to compromise their IT infrastructure. Pentests provide reliable results to this...
Pentest Scope: How to Determine the Testing Scope?
Pentests are one of the most effective security analysis methods to check the IT security level of a company and identify opportunities for...
What are the pentest analysis approaches?
Attackers gaining unauthorized access to IT systems and applications has severe consequences for companies. Pentests identify possible...
“Made by usd HeroLab” – Sebastian Puttkammer about Tools, Quality and Efficiency
Driven by the motivation to simplify the work for all team members, a team under the leadership of Sebastian Puttkammer, Managing Consultant...