business-2651346_1280

Cyber Security, Security Consulting

Security test: Access control systems are so easy to manipulate

Cyber Security

Data sharing and collaboration: the key to strengthening cyber security in the supply chain

The security of supply chains is crucial for protection against cyber threats. Given the global interconnectedness of companies and their suppliers, an end-to-end cyber security strategy is essential. A key element here is the increased exchange of data and cooperation between all parties involved in the supply chain in order to effectively minimise risks together and strengthen resilience to cyber attacks.

Cyber Security

Hackers Paradise or our presentation at Defcon – A look behind the scenes

DEFCON in Las Vegas is more than just an annual event: it is the ultimate meeting place for the global hacker community and a catalyst where technology enthusiasts drive the wave of innovation in cyber security. This year, my colleague Lukas Sökefeld and I had the honour of speaking at this prestigious conference about our PSIM hack of the market leader in Physical Security Information Management Systems.

Cyber Security

Microsoft is watching you – What you need to know when using Microsoft Teams

Companies and private individuals alike rely on Microsoft Teams. The advantages are obvious: central storage in the cloud, simple organisation of employees in groups and collaborative work on projects. But what about encryption to protect your information?
Was sagen Pentest über den Reifegrad der Cybersicherheit aus?

Cyber Security

What you can learn about cyber security from Pareto

Cyber Security

Cybersecurity in Industry 4.0 and Smart Factory: A challenge or a disruptive factor?

Digitalisation has reshaped our world in a way that we could hardly have imagined a few decades ago. It has optimised processes, facilitated communication and given us access to a wealth of information. However, this development has also brought with it new challenges and risks, particularly in the area of cyber security.

Cyber Security

AI voice cloning – how you can protect yourself from fraudsters

Impersonating someone else is easier than you think. Voice cloning tools such as Respeeacher or Murf imitate the sound of human voices with just a few seconds of original material. Fraudsters use these AI tools to make money.
Podium Hannover Messe 2022

Cyber Security, Management Consulting

Well supplied! Are you sure?

‘Solutions for sustainable security of supply for industry and society’ was the title of the press conference, which was also streamed in hybrid form as part of the Hanover trade fair on 30 May 2022. Holger Berens, Managing Partner at Concepture and Chairman of the Board at the Federal Association for the Protection of Critical Infrastructures (BSKI), was also present.
Konferenz HD

Cyber Security

The uncertainty is palpable

On 29 March 2022, the Health Captains Club (HCC) invited guests to the Badischer Hof in Heidelberg. The association holds regular international discussions on topics relating to the medical and hospital sector. Topics included cyber security and attacks from cyberspace.

Cyber Security, Management Consulting

No way back from New Work

The world of work has changed forever. Companies that have only just recognised the benefits of online collaboration solutions can usually no longer imagine ever working ‘the way they used to’ again.

Cyber Security, Security Consulting

Security test: Access control systems are so easy to manipulate

Cyber Security

Data sharing and collaboration: the key to strengthening cyber security in the supply chain

The security of supply chains is crucial for protection against cyber threats. Given the global interconnectedness of companies and their suppliers, an end-to-end cyber security strategy is essential. A key element here is the increased exchange of data and cooperation between all parties involved in the supply chain in order to effectively minimise risks together and strengthen resilience to cyber attacks.

Cyber Security

Hackers Paradise or our presentation at Defcon – A look behind the scenes

DEFCON in Las Vegas is more than just an annual event: it is the ultimate meeting place for the global hacker community and a catalyst where technology enthusiasts drive the wave of innovation in cyber security. This year, my colleague Lukas Sökefeld and I had the honour of speaking at this prestigious conference about our PSIM hack of the market leader in Physical Security Information Management Systems.

Cyber Security

Microsoft is watching you – What you need to know when using Microsoft Teams

Companies and private individuals alike rely on Microsoft Teams. The advantages are obvious: central storage in the cloud, simple organisation of employees in groups and collaborative work on projects. But what about encryption to protect your information?
Was sagen Pentest über den Reifegrad der Cybersicherheit aus?

Cyber Security

What you can learn about cyber security from Pareto

Cyber Security

Cybersecurity in Industry 4.0 and Smart Factory: A challenge or a disruptive factor?

Digitalisation has reshaped our world in a way that we could hardly have imagined a few decades ago. It has optimised processes, facilitated communication and given us access to a wealth of information. However, this development has also brought with it new challenges and risks, particularly in the area of cyber security.

Cyber Security

AI voice cloning – how you can protect yourself from fraudsters

Impersonating someone else is easier than you think. Voice cloning tools such as Respeeacher or Murf imitate the sound of human voices with just a few seconds of original material. Fraudsters use these AI tools to make money.
Podium Hannover Messe 2022

Cyber Security, Management Consulting

Well supplied! Are you sure?

‘Solutions for sustainable security of supply for industry and society’ was the title of the press conference, which was also streamed in hybrid form as part of the Hanover trade fair on 30 May 2022. Holger Berens, Managing Partner at Concepture and Chairman of the Board at the Federal Association for the Protection of Critical Infrastructures (BSKI), was also present.
Konferenz HD

Cyber Security

The uncertainty is palpable

On 29 March 2022, the Health Captains Club (HCC) invited guests to the Badischer Hof in Heidelberg. The association holds regular international discussions on topics relating to the medical and hospital sector. Topics included cyber security and attacks from cyberspace.

Cyber Security, Management Consulting

No way back from New Work

The world of work has changed forever. Companies that have only just recognised the benefits of online collaboration solutions can usually no longer imagine ever working ‘the way they used to’ again.

IHR ANSPRECHPARTNER

Clemens Schindler
Redaktion (v.i.s.d.P.)

Sie haben Fragen zu unseren Publikationen?
Kontaktieren Sie uns – direkt per Mail oder Telefon.
Wir freuen uns darauf, Sie und Ihr Unternehmen kennenzulernen.

Tel. +49 (0)7223 808479-23

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.