Professionally Evil Insights

Posts


The OPSEC of Protesting

For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony...


Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials.  Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very...


Encoding – CISSP Domain 3

Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion...


Summer Internship at Secure Ideas

This past summer, I worked as an intern for Secure Ideas. My role at the company was that of software developer, designing applications to streamline...


Bash Tips and Tricks

I know I definitely identify with being a visual learner, and I am happy to help where I can with creating content for the security/sysadmin (system...


Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  There is often some...


Visual Learner? Look no further!

Secure Ideas has been in the business for 10 years and over the last ten years we have found that everyone learns differently. There is no set way...


Proxying HTTPS Traffic with Burp Suite

This is easy to fix. All we need to do is tell our browser that the Burp CA can be trusted. Because every new installation of Burp generates a...


Asset Discovery

The first step in securing any organization is to understand what you have.  Unless you have a strong understanding of the systems and services on...