Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Installing Splunk: First stop on the road to log analysis
First thing’s first: What is Splunk and why do I want or need it? The short is answer is Splunk ...Learn more
Beware of Holiday Scams
It is that time of year and we need to be ready for the fraudsters to be out in full effect. The ...Learn more
SQLite: the good, the bad, the embedded database
SQLite is an embedded, open-source, lightweight SQL database engine. The C based library is ...Learn more
Thumb Drives.. Can you tell the difference?
During a physical penetration test, it is not uncommon for the tester (attacker) to drop usb thumb ...Learn more
Egress Filtering: Are you authorized to leave?
One of the first concerns with protecting a network is stopping outsiders from being able to enter ...Learn more
Logging Like a Lumber Jack
Turn on any news outlet or visit any news site and you will most likely see an announcement of ...Learn more
Policy Gap Analysis: Filling the Gaps
In today’s world, something never seems to be true unless it is written down, and even then it is a ...Learn more
New Data Security Breach Laws in Florida
Since many organizations are collecting what many would consider personal, non-public, ...Learn more
What Do You Expect From A PenTest?
There are many reasons that a company has a penetration test performed. Maybe it is due to ...Learn more
Ebay Falls Victim to Breach: Source Forge Updates Password Storage
It was just recently announced that eBay suffered a breach that led to the compromise of user ...Learn more
Webcast: Comprehensive testing: Red and Blue Make Purple
Secure Ideas is excited to announce a webcast scheduled for May 13th, 2014 on the topic of Purple ...Learn more
Purple Teaming for Success
You know what blue teams and red teams are. Red is our attack side, or the adversaries, and Blue ...Learn more