{"id":65306,"date":"2026-04-15T11:08:18","date_gmt":"2026-04-15T09:08:18","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=65306"},"modified":"2026-04-15T11:08:22","modified_gmt":"2026-04-15T09:08:22","slug":"our-red-team","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/red-teaming\/our-red-team\/","title":{"rendered":"Our Red Team"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_color=\"rgba(99,99,99,0.47)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-red-teaming-header-team.jpg\" background_blend=\"multiply\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">Our Red Team<\/h1>\n<p style=\"text-align: center;line-height: 130%\"><span>Understanding Attacks. Assessing Risks. Ready to Act.<br \/><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-red-teaming-kachel-team.jpg\" title_text=\"usd-red-teaming-kachel-team\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]Behind our Red Team stands an interdisciplinary group of experts with different backgrounds and perspectives. What unites us is a single question: How would a real attacker actually proceed, and how do attack and defense interact in practice?[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]For our customers, we plan and execute targeted threat driven attack simulations against their organizations. We consistently think from the perspective of real world attackers and assess whether viable attack paths can be developed from individual entry points and whether defined objectives are actually achievable. At the same time, we analyze whether attacks are detected, where they remain unnoticed, and how effective existing detection and response mechanisms really are.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"1%||||false|false\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2><\/h2>\n<h2>Deeply Specialized Expertise for Realistic Attack Simulations<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2><\/h2>\n<p>Our Red Team brings together specialists from different technical disciplines, combining deep expertise for realistic attack simulations. This includes exploit and malware development, reverse engineering, social engineering, and scenarios involving physical access. What matters most is how these capabilities work together.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>This makes it transparent how attacks unfold under realistic conditions, which risks emerge, and where concrete action is required. All operations are conducted in a controlled manner, in close coordination with our customers, and within clearly defined legal and ethical boundaries.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||||false|false\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slider _builder_version=\"4.27.6\" _module_preset=\"default\" min_height=\"10%\" height=\"10%\" custom_padding=\"0px||0px||true|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Tim-Woerner_PPT-Kontakt.jpg\" _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>\"Effective Red Teaming requires creativity and discipline in equal measure.<br \/>We approach every engagement with the mindset of a motivated attacker \u2013 always operating within strict ethical boundaries. This is how we protect our customers while revealing their real security posture.\"<\/p>\n<p><strong>Tim W\u00f6rner<br \/><\/strong><strong>usd Security Analyst and Red Team Lead<\/strong><\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Arvid-Mukherjee_PPT-Kontakt.jpg\" _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>\"We think like attackers. From red and purple teaming to adversary emulation and insider threats, we align our approach with the objectives of real-world attack groups and strategically employ both their techniques and tools\u2014as well as those we\u2019ve developed ourselves\u2014to put our clients\u2019 security architecture to the test. In doing so, we remain flexible, challenge assumptions, and deliberately stray from the beaten path.\"<\/p>\n<p><strong>Arvid Mukherjee<br \/><\/strong><strong>usd Security Analyst and Red Team Lead<\/strong><\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Lukas-Schraven_PPT-Kontakt.jpg\" _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>\"For us, red teaming means testing realistic scenarios to identify real risks for our clients. Cloud environments, Active Directory, and social engineering, in particular, often reveal the greatest vulnerabilities and provide the strongest basis for targeted security measures.\"<\/p>\n<p><strong>Lukas Schraven<br \/><\/strong><strong>usd Security Analyst Red Team<\/strong><\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"30px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2>Our Certifications<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_5,1_5,1_5,1_5,1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/CRTO.png\" title_text=\"CRTO\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Certified Red Team Operator<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/CRTL.png\" title_text=\"CRTL\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Certified Red Team Lead<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/OSCP.png\" title_text=\"OSCP\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Offensive Security Certified Professional<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/OSWE.png\" title_text=\"OSWE\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Offensive Security Web Expert<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/OSEP.png\" title_text=\"OSEP\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Offensive Security Experienced Penetration Tester<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_5,1_5,1_5,1_5,1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/OSCE.png\" title_text=\"OSCE\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" custom_padding=\"|||0px||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Offensive Security Certified Expert<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/SANS-FOR508.png\" title_text=\"SANS FOR508\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>SANS FOR508, Advanced Incident Response, Threat Hunting and Digital Forensics<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/PNPT.png\" title_text=\"PNPT\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Practical Network Penetration Tester<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Burp-Suite-Certified-Practitioner.svg\" title_text=\"Burp Suite Certified Practitioner\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Burp Suite Certified Practitioner<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/CEH.png\" title_text=\"CEH\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Certified Ethical Hacker<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_5,1_5,1_5,1_5,1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-HeroLab-Zertifikat.png\" title_text=\"Icon-HeroLab-Zertifikat\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>Enhanced Security Clearance \u00dc2 (according to the German Sicherheits-\u00fcberpr\u00fcfungs-gesetz (S\u00dcG))<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-HeroLab-Zertifikat.png\" title_text=\"Icon-HeroLab-Zertifikat\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>BSI Incident Practitioner<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-HeroLab-Badge-UCP-150dpi.png\" title_text=\"usd HeroLab Badge UCP 150dpi\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>usd HeroLab Certified Professional<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" custom_padding=\"||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||60px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-red-teaming.jpg\" title_text=\"usd-herolab-pentest-kachel-red-teaming\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<div class=\"et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<h2>Our Red Teaming Methodology<\/h2>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Learn about our red teaming methodology in detail and how we deliver actionable insights to improve your security measures.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming\/red-teaming-methodology\/\" url_new_window=\"on\" button_text=\"Our Red Teaming methodology in detail\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Red Team Understanding Attacks. Assessing Risks. Ready to Act.Behind our Red Team stands an interdisciplinary group of experts with different backgrounds and perspectives. What unites us is a single question: How would a real attacker actually proceed, and how do attack and defense interact in practice?For our customers, we plan and execute targeted threat [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":0,"parent":31742,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-65306","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/65306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=65306"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/65306\/revisions"}],"predecessor-version":[{"id":65344,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/65306\/revisions\/65344"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/31742"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=65306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}