I switched jobs on May 1, 2022, and now work as a Chief Development Architect Security returning to my old strengths. The time as a manager of an Internal Investigations Team investigating cases of fraud, corruption and bribery went by in a whim. If you stretch your mind a little bit, you could still state … More What I learned as an internal fraud investigator?
After a couple of articles on fraud related topics, I decided that it is high time that I publish another article on a security topic, which is dear to my heart. Quantum computing is on the brink of becoming a reality. IBM conducts research and innovation with its system Quantum Eagle. The German government decided … More Quantum computing will soon break current encryption algorithms
After my last blog on Language of a Con Manhttps://wordpress.com/post/gerlindezibulski.com/137 I have been listening to a lot of podcasts mostly on fraud and fraudsters. I will share a list of interesting podcasts, documentaries, and books in a future blog. One of the podcasts however was ABC’s podcast “Truth and Lies” on Jeffrey Epstein, deceased … More More on deviant language
I usually don’t look at cults when analysing fraud, but I was given the recommendation by American friends of mine to check out NXIVM (pronounced NEXIUM), of which I had not heard anything before. More details can be found here for example: https://en.wikipedia.org/wiki/NXIVM. I got curious and subscribed to an additional channel from one of … More Language of a con man – what can be learned from the NXIVM cult
If you’re working in Compliance, you surely followed the news on Germany’s latest major case of financial statement fraud of a DAX company (that is a company listed in the German stock exchange) called Wirecard. Assumed to be the poster child of a new technology company they seemed to be able to compete with the … More Wirecard
Last year I decided to look at security more from a defensive angle and switched jobs. I work in a team of Internal Investigators now analyzing fraud, corruption and bribery. It is well known that most inquiries start with a tip usually from an insider. Since many of such insiders fear for their job security … More Whistleblowing – an odd name
When I heard about the latest data loss in a well-known hotel chain, I was not enthused. It was more than 10 years ago that I joined the hotel’s guest program and I have stayed in many different places within their chain mostly on business travel though. Let me share my experience. I learned about … More Data Loss at a major hotel chain – sharing my experience
Is there an after one seems to wonder? Although the major hardware vendors have shipped fixes or new chips closing these vulnerabilities, new findings seem to appear every so often. One also wonders how the hardware vendors closed these vulnerabilities as some cases required a major architectural change, which could only be accomplished with new … More After Spectre and Meltdown – what now?
There is so much talk about cyberwar and advanced persistent threats. One can get really scared. However, if you look at the facts, you only have to follow the money. Or in other words answer the question, where can an attacker make the most bang for the buck. It is true that cyberwar has become … More Do we all WannaCry – or which threats should we expect?
At least when your company is in California, a state that has been quite at the forefront lately when implementing and enforcing new laws, rules or regulations in regards to IT security and data privacy. And they seem to continue to be up and at them… The linked article quotes a report by the Californian … More Will legal consequences improve security? – If you have not implemented critical security controls, soon your negligence could cause legal consequences.