FILL THE GAP – the new security podcast is here! 🎙

Security is complex - we help you to keep an overview. In FILL THE GAP, we talk to experts about current challenges, technological developments and real threat scenarios in the field of physical security!

Why should you listen to FILL THE GAP?

Security managers face new challenges every day: Technological developments, legal requirements and real threat scenarios make it difficult to maintain an overview. We bring clarity!

In this podcast you will learn

  • How cyber security and physical security intertwine
  • Why security measures fail in practice – and how you can do better
  • Which trends and innovations are shaping the security industry
  • Practical insights from leading security experts – vendor-neutral, informative & practical

Listen in and subscribe now! 🔔

Never miss an episode: Subscribe to FILL THE GAP on your favourite podcast platform and stay informed about the latest developments in the field of security.

👉 Listen & subscribe:

👉 Or watch & subscribe:

👉 Do you have an exciting topic or would you like to be a guest?
Write to us at: fillthegap.podcast@concepture.de or here

Miriam Strauß

Marketing & Kommunikation
Miriam Strauß is engaged daily in the latest developments in AI and marketing and is responsible for communications at Concepture.

Jetzt weiterlesen!

Cyber Security

GPS spoofing in logistics: Invisible danger for supply chains

Whether in the navigation system of modern vehicles or in the tracking chip on a freight pallet - GPS (Global Positioning System) is now an indispensable part of global supply chains and mobility solutions. But what happens when this technology is manipulated? GPS spoofing enables attackers to deliberately falsify positioning data - with potentially fatal consequences for companies, security and profitability.

Uncategorized

Vehicle restraint systems planned correctly: Safety begins before the fence

When it comes to protecting properties, infrastructure or public areas, many people first think of access control, video technology or alarm systems. But one central weak point often goes unnoticed: vehicle access - whether through accident, negligence or intent.

Fill The Gap, Security Compliance

The EU CER Directive explained – What companies need to know now

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.