Autor Andreas Scharf, IT-Security Engineer