Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Thanksgiving Hacks: Recipes for Cybersecurity Success
    As we gather around the table to celebrate Thanksgiving, it's essential to extend our gratitude to the digital realm that enhances our lives every day. Just like preparing a Thanksgiving feast involves careful planning and execution, securing our digital devices and information requires intentional ...
    Continue Reading

    Never miss a Professionally Evil update!

    What is Multi-Factor Authentication (MFA)?
    Multi-factor authentication (MFA), also known as two-factor authentication (2FA) or two-step ...
    Continue Reading
    Encrypting Data on the Steam Deck with Plasma Vaults
    encryption  |  Gaming  |  Privacy  |  Steam Deck
    In my previous post about the Steam Deck we discussed some of the privacy and security concerns ...
    Continue Reading
    Using PETaaS to Lower Your Cyber Insurance Costs
    information security  |  cybersecurity  |  pentesting  |  cost  |  PETaaS  |  Cyber Insurance  |  Insurance
    Modern networks have more than their fair share of risks, with the most damaging often being data ...
    Continue Reading
    Flipper Zero: A Hardware Hacking Multitool Webcast
    Training  |  hacking  |  hardware  |  webcast  |  flipper zero
    The Flipper Zero is known as a hacking multitool. It can cover a range of hacking from sub-ghz ...
    Continue Reading
    CyberScream - Hacking Like a Ghost(face)
    consulting  |  data breach  |  penetration testing  |  professionally evil  |  hacking  |  analysis  |  cybersecurity  |  pentesting  |  phishing  |  security breach  |  exploits  |  Halloween  |  webcast
    It’s that most hauntingly wonderful time of year again! Halloween is upon us, along with the dread ...
    Continue Reading
    Top Ten AWS Security Configurations: Mitigating Risk in the Cloud
    security controls  |  AWS  |  cloud  |  AWS Security  |  AWS Best Practices
    In an era of increasing cloud adoption, businesses must prioritize implementation of robust ...
    Continue Reading
    Backups Won't Stop Ransomware
    Ransomware attacks can have devastating consequences for organizations of all sizes and sectors, ...
    Continue Reading
    Webcast: Navigating Cloud Security​
    AWS  |  cloud  |  Azure  |  GCP
    In today's fast-paced digital landscape, organizations embrace the cloud as a cornerstone of their ...
    Continue Reading
    Bird's Eye View: Navigating the Landscape of Kubernetes Security
    Ready to dig into the world of Kubernetes security like never before? Join Secure Ideas’ own Cory ...
    Continue Reading
    Navigating the Changing Regulatory Landscape: Staying Ahead in a Shifting Environment
    In today's rapidly expanding business world, the only constant seems to be change itself. One of ...
    Continue Reading