• Topics
    • Regulations in the Financial System
    • KRITIS Audit
    • Cloud Security
    • Security of IT Systems
    • Application Security
    • Payment Security
    • Hacker Attacks
    • Trainings
    • Phishing Awareness Campaign
  • Services
    • Security Analysis & Pentests
      • Our Analysts
      • Pentest
      • Incident Response & Forensics
      • Code Review
      • Security Scan
      • Vulnerability Management Services
      • Live Hacking
      • Red Team Assessment
    • Security Consulting
      • Our Consultants
      • Information Security in the Financial System
      • ISMS / ISO 27001 Consulting
    • Security Audits
      • Our Auditors
      • PCI Audit
      • Cyber Security Check
      • KRITIS Audit
      • Cloud Security Audit
      • Internal Audit
      • SWIFT Assessment
      • Service Provider Audit
      • Internal Audit According to ISO 27001
    • PCI Security Services
      • Our PCI Auditors
      • PCI DSS
      • PCI DSS v4.0
      • Software Security Framework
      • P2PE
      • 3DS
      • PIN
      • PCI Security Awareness Training
      • PCI FAQ
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Onboarding
    • Your Benefits
    • Mission & Values
  • usd HeroLab
  • CST Academy
    • About CST Academy
    • Event Calender 2023
    • Seminars, Trainings and Workshops
    • Your CST Academy
    • CST Academy News
    • Webinars on YouTube
  • News & Articles
  • DE
usd Unternehmenslogo. more security. Security audits & Leistungen gegen Hacker
  • Topics
    • Regulations in the Financial System
    • KRITIS Audit
    • Cloud Security
    • Security of IT Systems
    • Application Security
    • Payment Security
    • Hacker Attacks
    • Trainings
    • Phishing Awareness Campaign
  • Services
    • Security Analysis & Pentests
      • Our Analysts
      • Pentest
      • Incident Response & Forensics
      • Code Review
      • Security Scan
      • Vulnerability Management Services
      • Live Hacking
      • Red Team Assessment
    • Security Consulting
      • Our Consultants
      • Information Security in the Financial System
      • ISMS / ISO 27001 Consulting
    • Security Audits
      • Our Auditors
      • PCI Audit
      • Cyber Security Check
      • KRITIS Audit
      • Cloud Security Audit
      • Internal Audit
      • SWIFT Assessment
      • Service Provider Audit
      • Internal Audit According to ISO 27001
    • PCI Security Services
      • Our PCI Auditors
      • PCI DSS
      • PCI DSS v4.0
      • Software Security Framework
      • P2PE
      • 3DS
      • PIN
      • PCI Security Awareness Training
      • PCI FAQ
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Onboarding
    • Your Benefits
    • Mission & Values
  • usd HeroLab
  • CST Academy
    • About CST Academy
    • Event Calender 2023
    • Seminars, Trainings and Workshops
    • Your CST Academy
    • CST Academy News
    • Webinars on YouTube
  • News & Articles
  • DE
Our Mission
Our Events
For the Community

usd AG

About us
Contact
Imprint
Privacy Protection
General Terms and Conditions

The Countdown is on: One Year until PCI DSS v4.0 Becomes Mandatory

Mar 17, 2023

On March 31, 2022, the PCI Security Standards Council (PCI SSC) published version 4.0 of PCI DSS - the most comprehensive update of the security standard for credit card data ever. Things are now getting serious for companies requiring certification: as of March 31,...

NTT Global Data Centers EMEA certified against PCI DSS v4.0 for the first time

Mar 6, 2023

NTT Global Data Centers EMEA, leading data center provider in Europe, successfully completed the joint PCI DSS certification project with usd AG on March 1, 2023. As a result, NTT Global Data Centers EMEA offers its customers a demonstrably secure environment for...

Security Advisories for NCP Secure Enterprise Client

Mar 3, 2023

The usd HeroLabs analysts examined the VPN application NCP Secure Enterprise Client during their security analyses. Several high vulnerabilities and one critical vulnerability were identified. Among others, these allowed an attacker to gain unauthorized read access to...

Report a vulnerability or bug

    linkedin icon     twitter icon