Anna Magdalena Kohl gives interview to PCI SSC about her career in the payment industry Women are still underrepresented in cyber security...
News
Hacker Contest with TU Darmstadt and h_da enters the next round
„This semester we had more registrations for our Hacker Contest than ever before," Markus Schader, Senior Security Consultant at usd HeroLab, is...
usd HeroLab Top 5 Vulnerabilities 2020: Cross-Site Scripting (XSS)
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
ISMS in a Nutshell - Part 2: The ISMS In the Company
Information security is first and foremost about protecting your corporate assets. In our mini-series, we explain terms, concepts and interesting...
Security Advisory 03/2021
The usd HeroLab pentesters identified a vulnerability in Check Point’s Identity Agent for Microsoft Windows while conducting their security...
More Security on Your Way to the Cloud
Lots of organizations today rely on cloud services to conduct their business. Due to the increasing complexity of cloud environments, assessing...
Implementation of New IT Solutions: Identifying Vulnerabilities in Time
Implementing new software or applications throughout a company requires detailed planning as well as the consideration of IT security aspects. One...
Microsoft Data Breach: Quick Answers Remain Crucial for Companies
The attack on Microsoft Exchange Server is still classified as business-critical by the Federal Office for Information Security (see...
PCI Secure Software Lifecycle Standard eligible for more software vendors
Recently the PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Lifecycle (Secure SLC) Standard and the...
Security Advisory 02/2021
During security analyses usd HeroLab penetration testers have identified two vulnerabilites in the online shop management system Zen Cart and in a...
Next Level Pentesting: Why the classic pentest approach is reaching its limits
For more than 25 years, we have been helping companies achieve more security and monitoring developments and trends. In this interview...
Cyber Security Check Helps Achieve Transparency in Potential IT Risks
With increasing digitalization and more complex IT environments, it is becoming more and more difficult for companies to maintain an overview of the...










