News
ISMS in a Nutshell - Part 3: Vulnerabilities, Threats, Risks
Information security is first and foremost about protecting your corporate assets. In our mini-series, we explain the terms, concepts and...
Dohop Successfully Certified according to PCI DSS
Dohop, an technology provider for the airline industry, has been successfully certified by usd AG according to PCI DSS. Based in Iceland, Dohop...
Security Advisory 04/2021
The usd HeroLab pentesters identified a vulnerability in Microsoft Windows 10 while conducting their security analysis. The disclosure of...
Version 1.1 Extends Scope of Secure Software Standard
The PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Standard and associated Program Guide last week. This...
Trust in your Abilities - Even as the Only Woman in the Room
Anna Magdalena Kohl gives interview to PCI SSC about her career in the payment industry Women are still underrepresented in cyber security...
Hacker Contest with TU Darmstadt and h_da enters the next round
„This semester we had more registrations for our Hacker Contest than ever before," Markus Schader, Senior Security Consultant at usd HeroLab, is...
usd HeroLab Top 5 Vulnerabilities 2020: Cross-Site Scripting (XSS)
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
ISMS in a Nutshell - Part 2: The ISMS In the Company
Information security is first and foremost about protecting your corporate assets. In our mini-series, we explain terms, concepts and interesting...
Security Advisory 03/2021
The usd HeroLab pentesters identified a vulnerability in Check Point’s Identity Agent for Microsoft Windows while conducting their security...
More Security on Your Way to the Cloud
Lots of organizations today rely on cloud services to conduct their business. Due to the increasing complexity of cloud environments, assessing...
Implementation of New IT Solutions: Identifying Vulnerabilities in Time
Implementing new software or applications throughout a company requires detailed planning as well as the consideration of IT security aspects. One...
Microsoft Data Breach: Quick Answers Remain Crucial for Companies
The attack on Microsoft Exchange Server is still classified as business-critical by the Federal Office for Information Security (see...