Sebastian Düringer, Senior Consultant at usd HeroLab and responsible for our Security Scans , explains why Security Scans are an excellent...
Cyber Defence
Security Scan and Pentest: What are the Differences?
A proactive protection against hacker attacks is essential, especially for systems and applications that are accessible from the Internet. A...
SAP Pentest: Identify the Gateways in your SAP Environment in Time
Businesses of all sizes and in all industries use SAP software, and it has become an indispensable part of day-to-day business. SAP system...
Red Teaming - A Controlled Stress Test for Your Company
During the Red Team Assesment, our security experts evaluate the resilience of your security organization against a cyber attack under real-life...
Software Security: Dynamic Code Analysis and Vulnerability Management
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Static Code Analysis
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Requirement and Threat Analysis
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Anchoring Security in the Corporate Culture
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
Software Security: Reasons for More Security
In practice, it is not an easy task for manufacturers to continuously integrate a strong security mindset into complex software projects. In our...
3 Reasons for a Cloud Security Audit
Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the...
Is Your Mainframe Protected against Hacker Attacks? Our Detailed Security Analysis Provides You with Answers
As complex and exceptionally powerful systems, mainframes significantly exceed the capacities of a typical PC or server. Particularly in industries...
With the right Cyber Security Strategy towards a secure Digital Transformation
The application of new technologies, the automatisation of processes and the interconnection of value chains determine the everyday work in...