During winter semester 22/23, the lecture "Selected Aspects of IT Security" ("Ausgewählte Aspekte der IT-Sicherheit“) was held in coorporation with...
CYBER SECURITY
Security Advisory for Microsoft Windows
The analysts at usd HeroLab examined various operating system versions of microsoft windows while conducting their security analyses. While...
PCI DSS – What You Need to Know
In this short series we provide you with useful facts about the Payment Card Industry Data Security Standard. Be well informed on your PCI DSS...
How to Efficiently Manage the Results of Technical Security Analyses
IT infrastructures are becoming ever more complex, threats ever more critical. Hence, it is crucial for companies to have a comprehensive overview...
5 reasons to run a Security Scan
Sebastian Düringer, Senior Consultant at usd HeroLab and responsible for our Security Scans , explains why Security Scans are an excellent...
Security Scan and Pentest: What are the Differences?
A proactive protection against hacker attacks is essential, especially for systems and applications that are accessible from the Internet. A...
SAP Pentest: Identify the Gateways in your SAP Environment in Time
Businesses of all sizes and in all industries use SAP software, and it has become an indispensable part of day-to-day business. SAP system...
Vulnerability Management Services (VMS) - Identify, Address and Track Vulnerabilities Early On
Markus Ritter, Managing Security Consultant of usd HeroLab and responsible for VMS, answers the most frequently asked questions on the topic of...
Goethe University Frankfurt and usd AG offer Cyber Security Seminar
For the fifth year in a row, the successful cooperation between usd AG and Goethe University Frankfurt is now being continued. As part of the joint...
With the right Cyber Security Strategy towards a secure Digital Transformation
The application of new technologies, the automatisation of processes and the interconnection of value chains determine the everyday work in...
Incident Response Tabletop – Is Your Company Prepared for an Emergency?
Cyber attacks are an everyday reality for companies – therefore it is important to close any entry gates. However, as this alone is not enough in...
Knowledge Exchange on Cyber Security More Important Than Ever Before
In 2021, knowledge exchange and training on cyber security topics will continue to be of fundamental importance. The CST Academy is therefore...









