• Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • PCI Audit
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • Pentest of AI/LLM Systems
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Red Team
    • Security Analyses
      • Overview Security Analyses
      • Vulnerability Management Services
      • Security Scans
      • Threat Modeling
      • Incident Response & Forensics
      • Code Review
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Threat Modeling
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2026
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE
usd Unternehmenslogo. more security. Security audits & Leistungen gegen Hacker
  • Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • PCI Audit
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • Pentest of AI/LLM Systems
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Red Team
    • Security Analyses
      • Overview Security Analyses
      • Vulnerability Management Services
      • Security Scans
      • Threat Modeling
      • Incident Response & Forensics
      • Code Review
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Threat Modeling
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2026
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE

Umweltschutz

#BeAware  |  Cloud Security  |  Customer Stories  | Cyber Defence  |  Cybersecurity Tips  |  Events & Community  |  Financial Sector & Compliance  |  Life@usd  |  News  |  PCI -Tipps  |  PCI News  |  Pentest Insights  |  Security Audits  |   Security Advisories  |  Security Research  |  usd Updates

Corporate Social Responsibility: usd Awarded EcoVadis Silver Medal Again in 2024

Corporate Social Responsibility: usd Awarded EcoVadis Silver Medal Again in 2024

Aug 6, 2024 | News, Corporate Social Responsibility, Life@usd

In 2024, usd AG was once again awarded the EcoVadis silver medal.

read more

usd AG

About us
Contact
Legal Notice
Privacy Protection
General Terms and Conditions
General Terms and Conditions of Purchase

© 2026 usd AG

News

NIS‑2 and ISO 27001: From Regulatory Pressure to a Strategic Security Framework

May 11, 2026

With the implementation of the NIS-2 Directive in Germany, information security has taken on a whole new importance in many companies. What was long handled at the operational and IT levels is now explicitly the responsibility of executive management under NIS-2. The...

PCI KMO v1.0: What You Need to Know About the New Key Management Operations Standard

Apr 27, 2026

With PCI Key Management Operations (KMO) v1.0, the PCI Security Standards Council is developing an independent standard for the operational management of cryptographic keys for the first time. The background to this is a fundamental change in the payment transaction...

Pentest of AI/LLM Systems: How to Secure Enterprise AI Systems

Apr 22, 2026

Artificial intelligence is already widely used across many organizations. Chatbots access internal knowledge, AI supports decision‑making or controls automated processes. As adoption increases, so does the attack surface, because AI applications behave fundamentally...

Follow Us

   

   

Report a Vulnerability or Bug