A few days ago, the AG KRITIS published the latest draft bill on the NIS-2 Implementation Law (NIS2UmsuCG) on its website. Which requirements could...
INFORMATIONSSICHERHEIT
TU meets usd: Students Gain Hands-On Insights into Information Security and Pentesting
During the winter semester 2024/25, students from Technische Universität Darmstadt had the opportunity to participate in two academic cooperations...
New Requirements of ISO/IEC 27006-1:2024: What Changes Do They Bring for Your Audit?
ISO/IEC 27006-1:2024 contains the formal requirements for certification bodies that must be implemented when auditing an information security...
Focus on Cyber Security: The ISF Grey Chapter Spring Meeting 2025 at usd AG
Two days, various perspectives, one common mission: Exchange and networking in the cyber security community. On 13 and 14 March 2025, usd AG hosted...
Marathon at Sprint Speed – LANCOM Systems Builds Certifiable ISMS
In an age when digitalization has become the norm in almost every industry, information security is becoming increasingly important for companies....
Information Security Management: Teaching Cooperation between TU Darmstadt and usd AG Continues
Sharing specialist knowledge with future security experts is an important part of our mission. That is why our colleagues are regularly engaged at...
Part-IS: The 7 Most Important Questions
Civil aviation consists of a complex network of numerous interrelated systems that are increasingly becoming the target of cyber attacks. Part-IS is...
Information Security in the Financial Sector: How Frankfurter Sparkasse is Tackling the Mammoth Task
The digital transformation in the financial sector has created new areas of attack for cyber criminals and therefore significant risks for...
Fat Client Pentesting: Hands-On Decompilation & Exploitation - Guest Lecture at Hochschule München University of Applied Sciences
Last Tuesday, usd visited the Hochschule München University of Applied Sciences for the second time as part of the "IT Security" lecture series. Our...
Information Security in Third-Party Risk Management: How to Set Up a TPRM Program
Companies often work with a large number of service providers in order to be able to concentrate on their core business or save costs. For this to...
Information Security in Third Party Risk Management: The Basics
Companies often work with a large number of service providers in order to be able to concentrate on their core business or save costs. For this to...
Guest Lecture at the TU Munich: Practical Insights into Cyber Security Audits and Compliance
Many people don't realize how much influence cyber security standards have on our daily lives. The credit card security standard PCI DSS is a great...