Since 2017, the Customer Security Controls Framework (CSCF) has been helping organizations to effectively secure their SWIFT infrastructure. The aim...
News
Focus On Payment Security: usd AG as Sponsor and Speaker at the PCI SSC Europe Community Meeting 2025 in Amsterdam
From 14 to 16 October 2025, Amsterdam will become the meeting place for the European payment security community. At this year's PCI SSC Europe...
usd AG successfully recertified: ISO 27001 and ISO 9001 confirm high standards in information security and quality
usd AG has once again successfully completed the recertification according to ISO 27001 and ISO 9001. You, as our client, benefit from information...
Tokenization: Reduce Your PCI DSS Scope
Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is of key relevance for companies that store, process, or transmit credit...
Avoid Pitfalls During ASV Scans: Practical Tips for Seamless Scans
Companies that accept, process, or store credit card data must comply with the requirements of the Payment Card Industry Data Security Standard (PCI...
Security Advisories on d.3one and Weblication CMS Core
The pentest professionals at usd HeroLab identified cross-site scripting vulnerabilities in Weblication CMS Core and d.3one during web application...
usd AG Once Again Awarded EcoVadis Silver – Sustainability as a Lived Responsibility
This year, usd AG was once again awarded the silver medal by EcoVadis for its commitment to Corporate Social Responsibility (CSR). Particularly...
Navigating DORA: Delvag's Successful Journey from Gap Analysis to Compliance
A cyberattack on an insurance company is far worse than just a technical problem: in addition to the breakdown of central IT systems, there is also...
New BSI Criteria Catalogues: Guidelines for the Use of AI in the Financial and Administrative Sectors
The German Federal Office for Information Security (BSI) has published two new sets of criteria for evaluating Artificial Intelligence (AI). They...
How to Strengthen Your Email Security: Insights from Our Pentesters
Email security is a key factor in application development and system configuration. Vulnerabilities in this environment can lead to data leaks and...
More Security for Connected Systems: Pentesting OT and IoT Systems In a Nutshell
Industrial systems, medical devices, connected machines in production, or embedded systems in vehicles: digitalization even affects systems that...
usd Experts Provide Support for Successful KRITIS Proof of Compliance
With several data centers spread across the globe, a European cloud hosting provider offers critical services to its customers around the world....











