• Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • PCI Audit
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Analysts
    • Security Analyses
      • Overview Security Analyses
      • Security Scans
      • Incident Response & Forensics
      • Code Review
      • Vulnerability Management Services
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Cyber Security Strategy
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2026
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE
usd Unternehmenslogo. more security. Security audits & Leistungen gegen Hacker
  • Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • PCI Audit
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Analysts
    • Security Analyses
      • Overview Security Analyses
      • Security Scans
      • Incident Response & Forensics
      • Code Review
      • Vulnerability Management Services
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Cyber Security Strategy
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2026
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE

Umweltschutz

#BeAware  |  Cloud Security  |  Customer Stories  | Cyber Defence  |  Cybersecurity Tips  |  Events & Community  |  Financial Sector & Compliance  |  Life@usd  |  News  |  PCI -Tipps  |  PCI News  |  Pentest Insights  |  Security Audits  |   Security Advisories  |  Security Research  |  usd Updates

Corporate Social Responsibility: usd Awarded EcoVadis Silver Medal Again in 2024

Corporate Social Responsibility: usd Awarded EcoVadis Silver Medal Again in 2024

Aug 6, 2024 | News, Corporate Social Responsibility, Life@usd

In 2024, usd AG was once again awarded the EcoVadis silver medal.

read more

usd AG

About us
Contact
Legal Notice
Privacy Protection
General Terms and Conditions
General Terms and Conditions of Purchase

© 2026 usd AG

News

Effectively Implementing Third-Party Risk Management under DORA

Mar 25, 2026

The Digital Operational Resilience Act (DORA) is now a reality for financial institutions and their service providers. In 2026, the focus will shift to the practical implementation of third-party risk management at financial institutions, as BaFin will conduct its...

Deep Dive Into Red Teaming: Physical Pentesting. How Resilient Is Your Organization?

Mar 19, 2026

As a security manager, you protect your systems and processes every day and invest in awareness training. However, experience shows that physical attacks are an often underestimated attack vector. Attackers combine digital and physical methods. This is where Red...

Security Advisories on Kofax Communication Server and ArcGIS Arcade

Mar 17, 2026

The pentest professionals at usd HeroLab examined Kofax Communication Server (KCS) and ArcGIS scripting language Arcade as part of web application pentests and identified several vulnerabilities. Two of the vulnerabilities result from...

Follow Us

   

   

Report a Vulnerability or Bug