Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Security Review of Nest Camera
I love tinkering with home automation and security solutions. The simplicity of turning on a light ...
Continue Reading
IAM Root: AWS IAM Simulator Tutorial
If you needed yet another reason to be paranoid about your personal information being exposed, the ...
Continue Reading
My Experience in the CISSP Mentorship Program
A little while back, I was talking with a friend of mine about the different services that Secure ...
Continue Reading
Game Console Hacking: Part 1 Lab Setup
This is the first in a series of blog posts on my journey through video game hacking and security. ...
Continue Reading
Using Components with Known Vulnerabilities
[Note: There is an updated version of this article] When dealing with cyber vulnerabilities, there ...
Continue Reading
Better API Penetration Testing with Postman – Part 4
This is the final part of this series on putting together a better API testing tool-chain. In Part ...
Continue Reading
Computers are People Too
There are those rare times during pen tests, when you are on a client’s network and you don’t have ...
Continue Reading
OWASP's Most Wanted (Continued)
In my last blog I talked about Command Injection and OS Injection OWASP’s Most Wanted, and will now ...
Continue Reading
Taming the Jungle: Hardening your AWS infrastructure
After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort ...
Continue Reading
10 Tips for Engaging a Security Services Vendor
The Information Security market brought in an estimated $167 billion in 2019 and that’s expected to ...
Continue Reading
File Encryption Using VHD and BitLocker
encryption |
Windows |
BitLocker |
VHD
When I was thinking of topics to write about, the idea of protecting the data we work with came to ...
Continue Reading