Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Supply Chain Security: Trust Is the New Attack Surface
    In February 2026, while participating in a panel at IT Expo, one statement kept resonating throughout the discussion: most breaches today don’t start at the perimeter, they do start with abused trust. For years, we invested heavily in defending the edge using mechanisms like firewalls, ...
    Continue Reading

    Never miss a Professionally Evil update!

    Evaluating AI Language Tutors Through a Security Lens
    Evaluating AI Language Tutors Through a Security Lens Over the past year or so, I have seen a ...
    Continue Reading
    Rolling for Resilience Part 3: Battle Prep - The Scrolls of Response
    This is the third post in this series addressing my perspective on the current state of ...
    Continue Reading
    Rolling for Resilience Part 2: The Communication Gauntlet
    This is the second post in this series addressing my perspective on the current state of ...
    Continue Reading
    Rolling for Resilience: A Strategic Guide to Cybersecurity Table-top Exercises
    This is the first post in this series addressing my perspective on the current state of ...
    Continue Reading
    Cybersecurity Essentials for SMBs: Building a Robust Program
    When discussions arise around companies' cybersecurity programs, the focus often gravitates towards ...
    Continue Reading
    Stay safe from cybercrime with these five tips
    cybersecurity  |  MFA
    Cybercriminals will use every tactic in the book to steal data, drain bank accounts, and extort ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 2. Authentication & Authorization
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. This ...
    Continue Reading
    Top 5 Security Considerations for a New Web App: 1. Secure Coding
    Welcome to my comprehensive series on the Top 5 Security Considerations for a New Web App. For this ...
    Continue Reading
    Top 5 Security Considerations for a New Web App
    There was a time when many folks responsible for building and deploying web applications were naive ...
    Continue Reading
    Everything You Need To Know About The Nist Cybersecurity Framework 2.0
    best practices  |  cybersecurity  |  government  |  CSF  |  cybersecurity standards  |  framework  |  NIST  |  profiles  |  tiers
    This week NIST released the highly anticipated update to the Cybersecurity Framework (CSF). Here’s ...
    Continue Reading
    12 Hacks of Christmas Day 12: Twelve Drummers Deleting Digital Clutter
    🎵 On the twelfth day, clear digital clutter with twelve drummers deleting. Regularly review and ...
    Continue Reading
    Has contents: true Total pages: 3 Current page: 1