Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Best Practices and Risks Considerations in Automation like LCNC and RPA
The Rise of Low-Code/No-Code and RPA in Digital Transformation Technologies such as Low-Code/No-Code (LCNC) and Robotic Process Automation (RPA) have become fundamental in the digital transformation of companies. They continue to evolve and redefine software development, providing new possibilities ...
Continue Reading
Never miss a Professionally Evil update!
Understanding TISAX: Securing the Path Forward for Automotive Innovation
The automotive industry's digital transformation has created unprecedented security challenges ...
Continue Reading
The Critical Need for API Security Testing
Application security penetration tests once were a novelty, a luxury that only organizations with ...
Continue Reading
Stay safe from cybercrime with these five tips
Cybercriminals will use every tactic in the book to steal data, drain bank accounts, and extort ...
Continue Reading
The Fellowship of the Phish: PayPal's Perilous Request Feature
In cybersecurity, we often find ourselves fixated on the latest sophisticated malware or zero-day ...
Continue Reading
Secure Ideas is CREST-Certified. Here’s Why That Matters
Cybersecurity is no longer a monolithic topic – if it ever was. Specialization matters. ...
Continue Reading
Step Into the Shadows: The Haunting of the Dark Web
Ready to venture into the unseen corners of the internet? Join us for a Halloween webcast, "The ...
Continue Reading
Automating UART Command Injection with the Flipper Zero and JavaScript
Overview The Flipper Zero recently came out with a JavaScript system built off of MJS that exposes ...
Continue Reading
What’s new in the OWASP Proactive Controls for 2024
I have taught a number of application security classes to developers. When it comes to ...
Continue Reading
Many Hands Approach To AppSec
"If you want to frustrate a good developer, interfere with their ability to complete work." - ...
Continue Reading
The CISO's Myopia
Fifteen years ago, I wrote an article entitled "The CSO’s Myopia." At the time, I aimed to ...
Continue Reading
Kubernetes Pentesting: The Hacker’s Harvest
Are you ready to dive into the world of Kubernetes pentesting? Join us for our upcoming webcast, ...
Continue Reading
Has contents: true
Total pages: 38
Current page: 1