Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    How to verify PGP signatures
    PGP (Pretty Good Privacy) is an encryption software that is mostly known for its use in email. It is used for encrypting, decrypting, and signing emails and files. Today we’ll focus on two of its most valuable features: verification and signing. Why check PGP signatures? Signing and verifying the ...
    Continue Reading

    Never miss a Professionally Evil update!

    Run as Admin: Executive Order on Cybersecurity
    On May 12, 2021, President Biden issued an executive order on cybersecurity. This new order ...
    Continue Reading
    AppSec Cheat Code: Shift Left, Shift Right, Up, Down & Start
    Seamless and unobtrusive security is the future. We are huge advocates of shifting left and moving ...
    Continue Reading
    3 Reasons to Pentest with Brave
    3 Reasons to Pentest with Brave November 30, 2020 March 19, 2021 / By Ochaun Marshall Penetration ...
    Continue Reading
    The OPSEC of Protesting
    For the past three months thousands of people have been protesting in the United States due to the ...
    Continue Reading
    [Update] Using Components with Known Vulnerabilities
    When an organization has a breach, you would like to imagine that the attacker crafted a new ...
    Continue Reading
    In Case of Fire: Break Windows
    When a client calls us to pentest a web application that is only available in Internet Explorer. I ...
    Continue Reading
    IAM Access Analyzer Review
    TL;DR – This is a free tool that helps solve one of the biggest security problems when working in ...
    Continue Reading
    IAM Root: AWS IAM Simulator Tutorial
    If you needed yet another reason to be paranoid about your personal information being exposed, the ...
    Continue Reading
    Taming the Jungle: Hardening your AWS infrastructure
    After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort ...
    Continue Reading
    Welcome to the New Secureideas.com
    We are excited to announce the launch of the new Secure Ideas website. It is located at the same ...
    Continue Reading
    Cave of Broken Mirrors: 3 Issues with AWS Cognito
    Rey while searching for someone finds a distorted reflection Secure Ideas is currently working on a ...
    Continue Reading
    Has contents: true Total pages: 2 Current page: 1