• Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Analysts
    • Security Analyses
      • Overview Security Analyses
      • Security Scans
      • Incident Response & Forensics
      • Code Review
      • Vulnerability Management Services
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Cyber Security Strategy
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2025
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE
usd Unternehmenslogo. more security. Security audits & Leistungen gegen Hacker
  • Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Analysts
    • Security Analyses
      • Overview Security Analyses
      • Security Scans
      • Incident Response & Forensics
      • Code Review
      • Vulnerability Management Services
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Cyber Security Strategy
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2025
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE

Umweltschutz

#BeAware  |  Cloud Security  |  Customer Stories  | Cyber Defence  |  Cybersecurity Tips  |  Events & Community  |  Financial Sector & Compliance  |  Life@usd  |  News  |  PCI -Tipps  |  PCI News  |  Pentest Insights  |  Security Audits  |   Security Advisories  |  Security Research  |  usd Updates

Corporate Social Responsibility: usd Awarded EcoVadis Silver Medal Again in 2024

Corporate Social Responsibility: usd Awarded EcoVadis Silver Medal Again in 2024

Aug 6, 2024 | News, Corporate Social Responsibility, Life@usd

In 2024, usd AG was once again awarded the EcoVadis silver medal.

read more

usd AG

About us
Contact
Legal Notice
Privacy Protection
General Terms and Conditions
General Terms and Conditions of Purchase

© 2025 usd AG

News

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Dec 11, 2025

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

After Drafts, Amendments, and Hearings, the NIS2UmsuCG Will Officially Enter Into Force in Germany on 06.12.2025

Dec 5, 2025

The NIS-2 Directive became binding in the EU at the beginning of 2023 in order to ensure a consistently high level of protection for critical and important services in all member states. The first step for the states was to implement the directive into national law....

Red Teaming: 5 Questions Every IT Leader Wants Answered

Dec 3, 2025

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Follow Us

   

   

Report a Vulnerability or Bug