We have written a lot over the past year and beyond, and we wanted to provide you with our Top 10 lists! Take a look and gain some new knowledge for the new year!!
Top 10 Blogs from 2019
- Better API Penetration Testing with Postman – Part 1 + Better API Penetration Testing with Postman – Part 2 + Better API Penetration Testing with Postman – Part 3 + Better API Penetration Testing with Postman – Part 4
- 10 Tips for Engaging a Security Services Vendor
- Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat
- We take security seriously and other trite statements
- Taming the Jungle: Hardening your AWS infrastructure
- Using Components with Known Vulnerabilities
- File Encryption Using VHD and BitLocker
- How to Test Your Security Controls for Small/Medium Businesses
- OWASP’s Most Wanted (Continued)
- Computers are People Too
Top 11 Most Popular Blogs
- Better API Penetration Testing with Postman – Part 1
- Getting Started with BeEF: The Browser Exploitation Framework
- Better API Penetration Testing with Postman – Part 2
- Better API Penetration Testing with Postman – Part 3
- Three C-Words of Web App Security: Part 1 – CORS
- Targeted Pineapple Setup (7 easy steps to gather credentials onsite)
- SSL Certificates: Setting Up and Authorizing the Internal Certificate Authority
- Automating Red Team Homelabs: Part 1 – Kali Automation
- Better API Penetration Testing with Postman – Part 4
- Three C-Words of Web App Security: Part 2 – CSRF
- Decoding F5 Cookie
We hope you have enjoyed these, and we are looking forward to providing you more content each and every year.
Professionally Evil Insights Blog Post
Blogs by experts of penetration testing and other security assessments.
Secure Ideas believes that security is a team sport, and we are constantly striving to improve our skills and knowledge so that we can better protect our clients. We are also committed to sharing our expertise with the wider community through training, speaking engagements, and blog posts such as these.
For more information about the above topic, or other security questions, please Contact Us. We are happy to discuss your specific needs and how we can help you achieve your security goals.