The attack on Microsoft Exchange Server is still classified as business-critical by the Federal Office for Information Security (see German …
10 Tips for Properly Handling Hacker Attacks
Reality shows that it is no longer sufficient to implement only preventive IT security measures. An attack is only a …
usd OrangeBox makes remote pentests simple
Many companies ask themselves whether attackers are able to compromise their IT infrastructure. Pentests provide reliable results to this question …
Pentest Scope: How to Determine the Testing Scope?
Pentests are one of the most effective security analysis methods to check the IT security level of a company and …
Unknown Vulnerabilities – Responsibilities of the Finder
The security analysts of usd HeroLab frequently discover previously unknown security vulnerabilities in products as part of their daily work. …
Pentest – What analysis approaches are there?
Attackers gaining unauthorized access to IT systems and applications has severe consequences for companies. Pentests identify possible gateways hackers could …
“Made by usd HeroLab” – Sebastian Puttkammer about Tools, Quality and Efficiency
Driven by the motivation to simplify the work for all team members, a team under the leadership of Sebastian Puttkammer, …
Top 7 Quality Criteria for a Pentest Partner
In the era of digitalization, the question of whether systems and applications are effectively protected from attackers is business critical …
What If a Gateway for Hackers Was Hidden in Your Source Code?
Code Review – the Supreme Discipline of Security Analyses Businesses today invest a lot in a wide range of security …
Security Education, Training & Awareness
What does a 250-year-old educator have to do with modern security awareness programs? Eva Willnecker, Senior Consultant at usd AG, …
- Page 1 of 2
- 1
- 2