Vladimir Putin: with whom do we have to deal here?

An analysis based on past behaviour, his autobiography and selected sources I usually write about topics like software and IT security in my blog. However given the geopolitical events, I decided to publish this blog which at least fits into the area of international security. So, who is Vladimir Putin? Vladimir Putin grew up like … More Vladimir Putin: with whom do we have to deal here?

Quantum computing will soon break current encryption algorithms

After a couple of articles on fraud related topics, I decided that it is high time that I publish another article on a security topic, which is dear to my heart. Quantum computing is on the brink of becoming a reality. IBM conducts research and innovation with its system Quantum Eagle. The German government decided … More Quantum computing will soon break current encryption algorithms

Language of a con man – what can be learned from the NXIVM cult

I usually don’t look at cults when analysing fraud, but I was given the recommendation by American friends of mine to check out NXIVM (pronounced NEXIUM), of which I had not heard anything before.  More details can be found here for example: https://en.wikipedia.org/wiki/NXIVM. I got curious and subscribed to an additional channel from one of … More Language of a con man – what can be learned from the NXIVM cult

Wirecard

If you’re working in Compliance, you surely followed the news on Germany’s latest major case of financial statement fraud of a DAX company (that is a company listed in the German stock exchange) called Wirecard. Assumed to be the poster child of a new technology company they seemed to be able to compete with the … More Wirecard

Data Loss at a major hotel chain – sharing my experience

When I heard about the latest data loss in a well-known hotel chain, I was not enthused. It was more than 10 years ago that I joined the hotel’s guest program and I have stayed in many different places within their chain mostly on business travel though. Let me share my experience. I learned about … More Data Loss at a major hotel chain – sharing my experience

After Spectre and Meltdown – what now?

Is there an after one seems to wonder? Although the major hardware vendors have shipped fixes or new chips closing these vulnerabilities, new findings seem to appear every so often. One also wonders how the hardware vendors closed these vulnerabilities as some cases required a major architectural change, which could only be accomplished with new … More After Spectre and Meltdown – what now?