Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Rolling for Resilience Part 4 - Boots in the Field: Manuals for Real-Time Action
    This is the fourth post in this series addressing my perspective on the current state of Cybersecurity Incident Response training and an approach to improve interest, participation, and expanded learning. Part I can be found here. Part II can be found here. Part III can be found here. Part IV: ...
    Continue Reading

    Never miss a Professionally Evil update!

    Rolling for Resilience Part 3: Battle Prep - The Scrolls of Response
    This is the third post in this series addressing my perspective on the current state of ...
    Continue Reading
    Rolling for Resilience Part 2: The Communication Gauntlet
    This is the second post in this series addressing my perspective on the current state of ...
    Continue Reading
    Rolling for Resilience: A Strategic Guide to Cybersecurity Table-top Exercises
    This is the first post in this series addressing my perspective on the current state of ...
    Continue Reading
    What does PCI require for Developer Training?
    Training  |  PCI  |  developers  |  application security  |  appsec
    The Payment Card Industry Security Standards Council (PCI SSC) defines compliance standards for all ...
    Continue Reading
    Flipper Zero: A Hardware Hacking Multitool Webcast
    Training  |  hacking  |  hardware  |  webcast  |  flipper zero
    The Flipper Zero is known as a hacking multitool. It can cover a range of hacking from sub-ghz ...
    Continue Reading
    Unleashing the Power of Flipper Zero: A Hacker's Multitool Webcast
    Training  |  wireless  |  webcast  |  flipper zero
    In the ever-evolving world of technology, the Flipper Zero has emerged as a game-changer, making ...
    Continue Reading
    Understanding Server-Side Template Injection (SSTI)
    Web applications play a vital role in delivering dynamic content to users. To achieve this, ...
    Continue Reading
    Introducing SamuraiWTF 5.3: A Powerhouse for Web App Pen Testing
    Testing  |  Training  |  samuraiWTF  |  web penetration testing  |  application security  |  professionally evil  |  Secure Ideas  |  hacking  |  OWASP  |  Project
    We are thrilled to announce the release of SamuraiWTF (Web Training Framework) version 5.3! This ...
    Continue Reading
    Introducing BILE - Groundbreaking Classification for Web App
    As a seasoned web application penetration tester, I've always felt that there should be a more ...
    Continue Reading
    Is the CISSP Mentorship for me?
    Training  |  CISSP
    “Knowledge is power.” That quote has been said more times than you can count because it’s true. The ...
    Continue Reading
    Has contents: true Total pages: 2 Current page: 1