Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
#AffordableTraining requires change
In 2019 Secure Ideas is dedicated to offering affordable security training to everyone. This ...
Continue Reading
What is Physical Security?
Ok, I’m just going to say it, I’m a physical security guy in a IT security world. So why physical ...
Continue Reading
Stored XSS: What Is It
In the cyber security world, there are a number of vulnerabilities to be aware of. Today we’re ...
Continue Reading
A Container Hacker’s Guide to Living Off of the Land
hacking |
container hacking |
container security |
containerization |
pentesting |
living off the land
Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
Continue Reading
The Ignorant Human: Data’s Biggest Threat
For all the money spent on expensive software solutions and expert consultation; an organization is ...
Continue Reading
Twelve Days of XSSmas
This series of daily mini-posts, running from December 12, 2018 to December 24, 2018, is intended ...
Continue Reading
Professionally Evil CISSP Certification: Breaking the Bootcamp Model
ISC 2 describes the CISSP as a way to prove “ you have what it takes to effectively design, ...
Continue Reading
Network Check Ups
Most people know that taking care of your personal health is important. We get regular check ups ...
Continue Reading
Compliance is not Security
Many folks get confused about the difference between security and compliance. Many, especially ...
Continue Reading
Three C-Words of Web App Security: Part 2 – CSRF
This is the second in a three-part series, Three C-Words of Web Application Security. I wrote a ...
Continue Reading
SamuraiWTF 4.0 Finally Released
In February of this year, Mic posted a blog discussing the future of SamuraiWTF (link provided if ...
Continue Reading
Has contents: true
Total pages: 30
Current page: 19