Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    The Growing Importance and Challenges of Wireless Networks in Operational Technology Wireless Networks are an expected component of everyday life. Some may not even remember a time without them, while others’ memories range from excitement of being untethered, to dread when addressing ...
    Continue Reading

    Never miss a Professionally Evil update!

    When Security Fails: What The DeepSeek Incident Can Teach Us About AI Security
    AI Security  |  Generative AI  |  LLM
    The advent of generative AI - particularly Large Language Models (LLMs) - marks a paradigm shift in ...
    Continue Reading
    Navigating the Security Roadmap: TISAX for Automotive OEMs
    As an Original Equipment Manufacturer, you stand at the helm of automotive innovation. Your ...
    Continue Reading
    Best Practices and Risks Considerations in Automation like LCNC and RPA
    best practices  |  LCNC  |  RPA
    The Rise of Low-Code/No-Code and RPA in Digital Transformation Technologies such as ...
    Continue Reading
    Understanding TISAX: Securing the Path Forward for Automotive Innovation
    The automotive industry's digital transformation has created unprecedented security challenges ...
    Continue Reading
    The Critical Need for API Security Testing
    Application security penetration tests once were a novelty, a luxury that only organizations with ...
    Continue Reading
    Stay safe from cybercrime with these five tips
    cybersecurity  |  MFA
    Cybercriminals will use every tactic in the book to steal data, drain bank accounts, and extort ...
    Continue Reading
    The Fellowship of the Phish: PayPal's Perilous Request Feature
    In cybersecurity, we often find ourselves fixated on the latest sophisticated malware or zero-day ...
    Continue Reading
    Secure Ideas is CREST-Certified. Here’s Why That Matters
    Cybersecurity is no longer a monolithic topic – if it ever was. Specialization matters. ...
    Continue Reading
    Step Into the Shadows: The Haunting of the Dark Web
    Halloween  |  DarkWeb
    Ready to venture into the unseen corners of the internet? Join us for a Halloween webcast, "The ...
    Continue Reading
    Automating UART Command Injection with the Flipper Zero and JavaScript
    UART  |  flipper zero
    Overview The Flipper Zero recently came out with a JavaScript system built off of MJS that exposes ...
    Continue Reading
    What’s new in the OWASP Proactive Controls for 2024
    I have taught a number of application security classes to developers. When it comes to ...
    Continue Reading
    Has contents: true Total pages: 39 Current page: 1