Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
How to Test Your Security Controls for Small/Medium Businesses
We often get contacted by small businesses requesting their first penetration test because of ...
Continue Reading
HIMSS 2019 - Champions of Security Unite
Organizations of all sizes and industries face increasing challenges in safeguarding vast amounts ...
Continue Reading
Cave of Broken Mirrors: 3 Issues with AWS Cognito
Rey while searching for someone finds a distorted reflection Secure Ideas is currently working on a ...
Continue Reading
Cracking WPA Pre Shared Keys
This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed ...
Continue Reading
Three C-Words of Web App Security: Part 3 – Clickjacking
This is the third and final part in this three-part series, Three C-Words of Web Application ...
Continue Reading
Fuzz Testing
If you have a brand new piece of software, a program, a network, or an operating system, you will ...
Continue Reading
#AffordableTraining requires change
In 2019 Secure Ideas is dedicated to offering affordable security training to everyone. This ...
Continue Reading
What is Physical Security?
Ok, I’m just going to say it, I’m a physical security guy in a IT security world. So why physical ...
Continue Reading
Stored XSS: What Is It
In the cyber security world, there are a number of vulnerabilities to be aware of. Today we’re ...
Continue Reading
2018 Year in Review
As we put the finishing touches on another tremendous year, and look toward the New Year, we at ...
Continue Reading
A Container Hacker’s Guide to Living Off of the Land
hacking |
container hacking |
container security |
containerization |
pentesting |
living off the land
Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
Continue Reading
Has contents: true
Total pages: 38
Current page: 18