• Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • PCI Audit
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Analysts
    • Security Analyses
      • Overview Security Analyses
      • Security Scans
      • Incident Response & Forensics
      • Code Review
      • Vulnerability Management Services
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Cyber Security Strategy
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2026
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE
usd Unternehmenslogo. more security. Security audits & Leistungen gegen Hacker
  • Spotlights
    • AI
    • TLPT
    • NIS-2
    • Part-IS
    • SAP Security
    • DORA
  • Services
    • Security Audits
      • Overview Security Audits
      • Supplier Audit
      • Cyber Security Check
      • Internal Audit
      • Cloud Security Audit
      • Our Auditors
    • PCI & Payment Security
      • Overview PCI & Payment Security
      • PCI DSS
      • PCI SSF
      • PCI Consulting
      • PCI Audit
      • Security Analysis for PCI DSS
      • EPI
      • SWIFT Assessment
      • Our Auditors
    • Pentests
      • Overview Pentests
      • Our Pentest Approach
      • System Pentest
      • Web Application Pentest
      • API Pentest
      • Mobile App Pentest
      • Active Directory Pentest
      • Pentesting OT and IoT Systems
      • Cloud Pentest
      • SAP Pentest
      • Fat Client Pentest
      • Mainframe Pentest
      • Single Sign-On Pentest
      • Workstation Pentest
      • usd HeroLab
      • Our Analysts
    • Red Teaming
      • Overview Red Teaming
      • Our Methodology
      • usd HeroLab
      • Our Analysts
    • Security Analyses
      • Overview Security Analyses
      • Security Scans
      • Incident Response & Forensics
      • Code Review
      • Vulnerability Management Services
      • usd HeroLab
      • Our Analysts
    • Security Consulting
      • Overview Security Consulting
      • InfoSec in Finance
      • NIS-2
      • ISMS/ISO 27001 Consulting
      • Part-IS
      • Cyber Security Strategy
      • Our Consultants
    • InfoSec in Finance
      • Overview InfoSec in Finance
      • DORA
      • BaFin's xAIT
      • Supplier Audit
      • Our Consultants
    • ISMS & ISO 27001
      • Overview ISMS/ISO 27001 Consulting
      • Internal ISO 27001 Audit
      • Part-IS
      • Our Consultants
  • About usd AG
    • About us
    • Our References
    • Corporate Social Responsibility
  • Career
    • Students
    • Onboarding
    • Your Benefits
    • Mission & Values
  • CST Academy
    • About CST Academy
    • Event Calendar 2026
    • Tailored Seminars, Trainings & Workshops
    • Your CST Academy
    • Our Webinar Archive on YouTube
  • News
  • DE

Worldline

#BeAware  |  Cloud Security  |  Customer Stories  | Cyber Defence  |  Cybersecurity Tips  |  Events & Community  |  Financial Sector & Compliance  |  Life@usd  |  News  |  PCI -Tipps  |  PCI News  |  Pentest Insights  |  Security Audits  |   Security Advisories  |  Security Research  |  usd Updates

“The Journey to Harmonisation of Global PCI Assessments”: Joint Contribution of Worldline and usd to the PCI SSC Community Meeting Europe

“The Journey to Harmonisation of Global PCI Assessments”: Joint Contribution of Worldline and usd to the PCI SSC Community Meeting Europe

Oct 19, 2023 | News, Customer Stories, Events & Community, PCI

PCI DSS applies to all companies that store, process or transmit payment card data. However, large and global organizations in particular face PCI...

read more

usd AG

About us
Contact
Legal Notice
Privacy Protection
General Terms and Conditions
General Terms and Conditions of Purchase

© 2026 usd AG

News

Deep Dive Into Red Teaming: Physical Pentesting. How Resilient Is Your Organization?

Mar 19, 2026

As a security manager, you protect your systems and processes every day and invest in awareness training. However, experience shows that physical attacks are an often underestimated attack vector. Attackers combine digital and physical methods. This is where Red...

Security Advisories on Kofax Communication Server and ArcGIS Arcade

Mar 17, 2026

The pentest professionals at usd HeroLab examined Kofax Communication Server (KCS) and ArcGIS scripting language Arcade as part of web application pentests and identified several vulnerabilities. Two of the vulnerabilities result from...

EU Cyber Resilience Act (CRA): Threat Modeling as a Compliance Accelerator

Mar 11, 2026

The Cyber Resilience Act (CRA) is fundamentally changing how companies must prove the security of their digital products. In the future, security will no longer be seen as a one-off measure, but will be required consistently throughout the entire product life cycle:...

Follow Us

   

   

Report a Vulnerability or Bug