<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://gerlindezibulski.com/about-gerlinde/</loc><lastmod>2025-06-05T05:43:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://gerlindezibulski.com/2024/08/10/y2k-finally-came-albeit-it-was-called-crowdstrike/</loc><lastmod>2024-08-10T16:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2023/08/19/after-the-storm/</loc><lastmod>2023-08-19T08:48:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2022/07/09/vladimir-putin-with-whom-do-we-have-to-deal-here/</loc><lastmod>2023-07-09T17:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2022/11/26/he-weworked-but-now-he-is-in-the-flow/</loc><lastmod>2022-11-26T09:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2022/11/05/and-another-openssl-security-vulnerability/</loc><lastmod>2022-11-05T15:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2022/10/09/germanys-cybersecurity-councils-or-social-engineering-goes-organisations/</loc><lastmod>2022-10-09T10:22:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2022/06/25/co-authored-book-about-sap-career-just-published/</loc><lastmod>2022-06-25T15:35:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2022/05/23/what-i-learned-as-an-internal-fraud-investigator/</loc><lastmod>2022-05-23T20:15:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/eine-seite/</loc><lastmod>2022-05-20T18:42:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://gerlindezibulski.com/2022/01/09/quantum-computing-will-soon-break-current-encryption-algorithms/</loc><lastmod>2022-04-15T08:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2021/08/27/more-on-deviant-language/</loc><lastmod>2021-08-27T14:52:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2021/02/15/language-of-a-con-man-what-can-be-learned-from-the-nxivm-cult/</loc><lastmod>2021-02-18T13:48:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2020/09/07/wirecard-or-germany-has-its-bernie-madoff-now/</loc><image:image><image:loc>https://gerlindezibulski.com/wp-content/uploads/2020/09/wirecard4.jpg</image:loc><image:title>Wirecard4</image:title></image:image><image:image><image:loc>https://gerlindezibulski.com/wp-content/uploads/2020/09/wirecard3.jpg</image:loc><image:title>Wirecard3</image:title></image:image><image:image><image:loc>https://gerlindezibulski.com/wp-content/uploads/2020/09/wirecard2.jpg</image:loc><image:title>Wirecard2</image:title></image:image><image:image><image:loc>https://gerlindezibulski.com/wp-content/uploads/2020/09/wirecard1.jpg</image:loc><image:title>Wirecard1</image:title></image:image><lastmod>2021-02-17T16:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2020/06/15/whistleblowing-an-odd-name/</loc><lastmod>2020-06-15T15:52:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2019/02/21/data-loss-at-a-major-hotel-chain-sharing-my-experience/</loc><lastmod>2019-02-21T16:45:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2018/10/11/after-spectre-and-meltdown-what-now/</loc><lastmod>2018-10-11T16:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2017/06/17/do-we-all-wanncry-or-which-threats-should-we-expect/</loc><lastmod>2018-05-24T17:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2016/06/28/will-legal-consequences-improve-security-if-you-have-not-implemented-critical-security-controls-soon-your-negligence-could-cause-legal-consequences/</loc><lastmod>2016-06-28T16:49:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2016/04/29/x-509-certificates-are-back/</loc><lastmod>2016-04-29T11:42:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2016/04/19/ease-of-use-versus-security-strengths-the-inversely-proportional-relationship/</loc><image:image><image:loc>https://gerlindezibulski.com/wp-content/uploads/2016/04/eou_vs_sec_strengths_auth_options.jpg</image:loc><image:title>Ease of use versus security strengths with authentication options</image:title></image:image><image:image><image:loc>https://gerlindezibulski.com/wp-content/uploads/2016/04/eou_vs_sec_strengths.jpg</image:loc><image:title>Ease of use versus security strengths</image:title></image:image><lastmod>2016-04-19T15:11:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2016/03/04/how-to-keep-your-systems-secure-always-implement-the-latest-security-patch-as-soon-as-possible/</loc><lastmod>2016-03-04T10:37:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/12/12/encryption-of-communication-paths-its-so-easy-but-often-not-implemented/</loc><lastmod>2015-12-12T15:10:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/12/02/authorization-management-unsolved-or-the-continuos-role-access-management-inflation/</loc><lastmod>2015-12-02T10:21:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/10/31/your-system-or-application-is-definitely-insecure-if/</loc><lastmod>2015-10-31T14:21:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/10/23/social-engineering-is-alive-and-kicking/</loc><lastmod>2015-10-26T20:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/08/security-anonymous-the-twelve-step-program/</loc><lastmod>2015-10-26T17:19:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/10/12/the-united-states-are-not-a-safe-harbor/</loc><lastmod>2015-10-12T16:39:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/10/05/same-old-same-old/</loc><lastmod>2015-10-05T16:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/10/01/what-is-cybersecurity-or-are-you-fully-buzzword-compliant-yet/</loc><lastmod>2015-10-01T17:22:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/28/what-happens-with-all-the-stolen-data/</loc><lastmod>2015-09-28T15:42:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/23/the-economics-of-selling-security-vulnerabilities-or-there-is-a-market-for-everything/</loc><lastmod>2015-09-23T15:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/21/how-do-you-stay-up-to-snuff-on-security/</loc><lastmod>2015-09-21T15:20:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/18/security-is-important-or-why-every-cso-wants-to-bang-their-head-against-a-wall/</loc><lastmod>2015-09-18T16:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/15/advanced-persistent-threats-or-the-new-cyberwarfare/</loc><lastmod>2015-09-15T15:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/11/the-crypto-currency-bitcoin-or-trust-as-the-key-concept-of-it-security/</loc><lastmod>2015-09-11T15:04:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/04/internet-pillory-what-we-need-to-learn-from-the-ashley-madison-hack/</loc><lastmod>2015-09-04T14:27:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/09/02/secure-digital-business-transformation-what-every-chief-security-officer-cso-needs-to-know/</loc><lastmod>2015-09-02T15:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/08/24/it-security-101-or-how-can-you-secure-your-it-landscapes/</loc><lastmod>2015-08-29T04:29:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/08/21/hallo-welt/</loc><lastmod>2015-08-28T17:06:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/08/25/whats-wrong-with-this-security-requirement-or-passwords-are-the-weakest-link-for-attacks/</loc><lastmod>2015-08-28T17:05:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com/2015/08/28/every-sensor-its-unique-id-really/</loc><lastmod>2015-08-28T17:05:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://gerlindezibulski.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-06-05T05:43:13+00:00</lastmod></url></urlset>
