Month: April 2014

Purple Teaming for Success

You know what blue teams and red teams are.  Red is our attack side, or the adversaries, and Blue is the defense side.  Unfortunately, we don’t see both teams working together in many situations.  Having a red team test your network or application provides a great service to understanding the weaknesses.  But this is not …

Purple Teaming for Success Read More »

All Your Base Are Belong to #HeartBleed – OpenSSL Heartbeat Overflow

What You Need to Know and Do About It Unless you’ve been hiding under a rock, I’m sure you have heard about the overflow vulnerability in OpenSSL’s heartbeat extension.  All today I watched my Twitter feed talk back and forth about this vulnerability and its impact.  In fact, as I write this post a search …

All Your Base Are Belong to #HeartBleed – OpenSSL Heartbeat Overflow Read More »

Professionally Evil Training: Tactical Burp Suite Webinar

Tactical Burp Suite Webinar Secure Ideas is excited to announce its latest upcoming online training.  We will be offering a two-hour session exploring Burp Suite and its use in a web application penetration test.  Kevin Johnson and James Jardine will explore the various features of Burp Suite, focused on how we use the system during …

Professionally Evil Training: Tactical Burp Suite Webinar Read More »

Oversharing: Who Has Access?

 What types of information do you copy to a shared folder?  Who has access to the share?  This can be a difficult problem within many organizations to handle these questions.  From a user perspective, a shared folder is just a means to collaborate.  We often don’t think about what type of data is in the …

Oversharing: Who Has Access? Read More »

Scroll to Top