Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
OT: The Invisible World in Motion
We are surrounded by technology, not just in what we carry but in nearly every aspect of our daily lives. For many, the term Operational Technology (OT) is largely unknown and even less is the understanding of how it works. Many perceive manufacturing to be what OT is all about. Though this is ...
Continue Reading
Never miss a Professionally Evil update!
Solicited Public Comment on HIPAA Security Rule NPRM To Strengthen the Cybersecurity of ePHI
The Department of Health and Human Services (HHS) wants to raise the benchmarks of the Security ...
Continue Reading
Building a Custom Burp Suite Collaborator Everywhere BApp
Have you ever run into an issue when using a BApp in Burp Suite that it didn’t quite work with your ...
Continue Reading
Quick Bites Episode 12 - Hidden Treasures
Ever go on a treasure hunt? Ever find any hidden treasure? It’s a blast! One of my favorite ...
Continue Reading
Operational Technology’s use of Wireless Networks
The Growing Importance and Challenges of Wireless Networks in Operational Technology
Continue Reading
When Security Fails: What The DeepSeek Incident Can Teach Us About AI Security
The advent of generative AI - particularly Large Language Models (LLMs) - marks a paradigm shift in ...
Continue Reading
Navigating the Security Roadmap: TISAX for Automotive OEMs
As an Original Equipment Manufacturer, you stand at the helm of automotive innovation. Your ...
Continue Reading
Best Practices and Risks Considerations in Automation like LCNC and RPA
best practices |
LCNC |
RPA
The Rise of Low-Code/No-Code and RPA in Digital Transformation Technologies such as ...
Continue Reading
Understanding TISAX: Securing the Path Forward for Automotive Innovation
The automotive industry's digital transformation has created unprecedented security challenges ...
Continue Reading
The Critical Need for API Security Testing
Application security penetration tests once were a novelty, a luxury that only organizations with ...
Continue Reading
Stay safe from cybercrime with these five tips
Cybercriminals will use every tactic in the book to steal data, drain bank accounts, and extort ...
Continue Reading
The Fellowship of the Phish: PayPal's Perilous Request Feature
In cybersecurity, we often find ourselves fixated on the latest sophisticated malware or zero-day ...
Continue Reading
Has contents: true
Total pages: 39
Current page: 1