Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Summer Internship at Secure Ideas
    This past summer, I worked as an intern for Secure Ideas. My role at the company was that of ...
    Continue Reading
    Bash Tips and Tricks
    I know I definitely identify with being a visual learner, and I am happy to help where I can with ...
    Continue Reading
    Hashing Functions – CISSP Domain 3
    Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP ...
    Continue Reading
    Visual Learner? Look no further!
    Secure Ideas has been in the business for 10 years and over the last ten years we have found that ...
    Continue Reading
    Waving the White Flag: Why InfoSec should stop caring about HTTPOnly
    As a company that is constantly working with our penetration testing clients on understanding where ...
    Continue Reading
    Proxying HTTPS Traffic with Burp Suite
    The Problem For newcomers to application penetration testing, a reasonably common question is How ...
    Continue Reading
    Einstein Told Us: Why User Awareness is NOT the right focus
    “The definition of insanity is doing the same thing over and over again and expecting different ...
    Continue Reading
    Cooking up Better Security Incident Communications
    I am fond of meal kits. I enjoy the entire experience: the scrolling through delicious-looking meal ...
    Continue Reading
    Asset Discovery
    The first step in securing any organization is to understand what you have. Unless you have a ...
    Continue Reading
    Getting Started API Penetration Testing with Insomnia
    In our blog series on Better API Penetration Testing with Postman we discussed using Postman as the ...
    Continue Reading
    [Update] Using Components with Known Vulnerabilities
    When an organization has a breach, you would like to imagine that the attacker crafted a new ...
    Continue Reading
    Has contents: true Total pages: 39 Current page: 15

    Never miss a professionally evil update!