News
No More Wild Growth in the Cloud: More Security through the Right Governance
With the cloud, they said, everything will be nicer. Better. Simpler. But also more secure? This was the motto of the expert presentation held by...
SAP from an Attacker's Perspective - Common Vulnerabilities and Pitfalls: usd AG gives presentation at MCTTP Conference
From September 13 until September 15, 2023, the first MCTTP - MUNICH CYBER TACTICS, TECHNIQUES AND PROCEDURES will take place in Munich. The focus...
PCI DSS - What is the Assessment Procedure?
In this short series we provide you with useful facts about the Payment Card Industry Data Security Standard (PCI DSS). Be well informed on your PCI...
#HackerCommunity #ToolDemos #ShowTime - A Retro on Black Hat and DEF CON 2023
7 days. 3 security analysts. 2 conferences. 4 presentations. 3 tools. An exciting week in Las Vegas lies behind our usd HeroLab colleagues Florian...
usd AG Again Receives Worldwide Accreditation as Approved Scanning Vendor (ASV)
A few days ago, usd AG once again received accreditation as an Approved Scanning Vendor (ASV) with the scanning services of the usd PCI DSS...
Eurowings GmbH Achieves ISO/IEC 27001:2013 and PCI DSS Certifications with Support from usd AG
As for many companies in the aviation industry, the summer of 2022 was marked by extreme challenges for Eurowings GmbH: the pandemic, the tense...
More security at TU Darmstadt: Student Council Award for "Best Teaching" goes to Maximilian Müller
Sharing expertise with the next generation of security experts is an important part of our mission. That is why our colleagues are regularly...
Corporate Social Responsibility: usd 2023 Awarded EcoVadis Silver Medal Again
Taking responsibility in the areas of research & education, social commitment and sustainability is not only an essential part of the usd...
Security Advisory for Windows Admin Center
The analysts at usd HeroLab examined the centralized management tool Windows Admin Center while conducting their security analyses. During...
Microsoft 365 - Why should your environment be subject to a configuration audit?
Whether you are a large enterprise or a medium-sized business, Microsoft 365 is becoming increasingly popular. Many companies have already ventured...
Cyber Security Check: The 7 most important questions
Cyber security has become a key concern for businesses of all sizes in today's interconnected world, where organizations are increasingly reliant on...
KRITIS: The Critical Infrastructure Growth Spiral
Critical infrastructures form the foundation of our modern society. They ensure the smooth functioning of a wide range of sectors and...