The Concepture Blog.

We regularly write about news & insights from the security industry and share tips on how to improve your approach to cybersecurity and data protection.

Vehicle restraint systems planned correctly: Safety begins before the fence

When it comes to protecting properties, infrastructure or public areas, many people first think of access control, video technology or alarm systems. But one central weak point often goes unnoticed: vehicle access – whether through accident, negligence or intent.

Fill The Gap, Security Compliance

The EU CER Directive explained – What companies need to know now

Fill The Gap

Robots on patrol – How robotics and AI are changing the security industry with Severin Pfister (Ascento)

Security robots that independently monitor terrain, recognise anomalies and communicate with existing systems - what sounds like science fiction has long since become reality. In the latest episode of FILL THE GAP, the security podcast, we talk to Severin Pfister from Ascento about the use of robotics and artificial intelligence in property protection.

Security Compliance

NIS 2 and CER: How the delayed legal implementation in Germany is putting KRITIS operators under pressure

The resilience of our critical infrastructures (KRITIS) is at stake. While other EU countries have long since created facts, Germany is lagging alarmingly behind in the crucial implementation of European requirements for KRITIS security, in particular the NIS-2 and CER directives.

Fill The Gap, Security Consulting

FILL THE GAP – the new security podcast is here! 🎙

Security is complex - we help you to keep an overview. In FILL THE GAP, we talk to experts about current challenges, technological developments and real threat scenarios in the field of physical security!

Cyber Security, Management Consulting, Security Consulting

Security 2025: The top trends that no company can ignore

The security landscape is changing rapidly. To stay protected in the future, companies must focus on trends like OSINT, robotics, and Zero Trust by 2025. This article outlines the five key developments that you can’t ignore and a groundbreaking technology that could transform security.

Cyber Security

Deepfakes: More Than Just a Digital Facelift – A Cybersecurity Threat

I recently came across an interesting article by BlackBerry titled "Deepfakes and Digital Deception." It painted a vivid picture of the rising threat of deepfakes in the cybersecurity landscape. While deepfakes can be entertaining, their potential for malicious use is what truly caught my attention. The article effectively highlights how deepfakes, fueled by advancements in generative AI, are becoming increasingly sophisticated and accessible. This ease of creation, coupled with the persuasive power of deepfakes, makes them a potent tool for cybercriminals.

Miriam Strauß

Editorial Team (responsible in accordance with the German Press Law)

Do you have questions about our publications?
Get in touch with us – directly via email or phone.
We look forward to getting to know you and your company.

Phone: +49 (0)7223 808479-32

 

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.