Knowledge Center
Get the answers you need to choose the right security services for your organization..
What Tasks are Performed During a Hardware Security Assessment?
A hardware security assessment is a review of a physical device and a very common task when ...
Continue Reading
How is Embedded/IoT Scoping Different from a Normal Pentest?
consulting |
security |
penetration testing |
business |
scope |
IoT |
Embedded Device
A Penetration Test is a Penetration Test, Right? On the surface, that would be the case if we are ...
Continue Reading
What is GLBA Compliance Penetration Testing?
information security |
penetration testing |
compliance |
risk assessment |
information security program |
GLBA |
Safeguards Rule |
vulnerability assessment
When it comes to safeguarding student data, educational institutions must meet several compliance ...
Continue Reading
How Soon Can We Schedule a Test?
The short and sweet answer is that once a contract has been executed by both parties, and all ...
Continue Reading
Secure Ideas Penetration Testing Methodology
When it comes to partnering with an outside security consulting firm, there are many things to ...
Continue Reading
Project Responsibilities
consulting |
security |
web penetration testing |
information security |
penetration testing |
application security |
professionally evil |
Secure Ideas |
network security |
cybersecurity |
pentesting |
business |
service |
methodology |
Project |
Responsibilities
At Secure Ideas we pride ourselves on our attention to detail in preparing clients for a project. ...
Continue Reading
What Sets Secure Ideas Apart From Other Security Consulting Firms?
FAQ |
consulting |
security |
web penetration testing |
information security |
penetration testing |
professionally evil |
Secure Ideas |
network security |
cybersecurity |
pentesting |
business
Secure Ideas at a Glance As an industry leader in security consulting, training, and penetration ...
Continue Reading
Get To Know the Professionally Evil Experts
consulting |
information security |
penetration testing |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
technology |
industry leaders |
experts |
SME
Kevin Johnson - CEO, Principal Consultant, and Head Nerd!
Continue Reading
How to quickly estimate the cost of a penetration test.
If you are new to organizing a third-party penetration test, chances are you will face the ...
Continue Reading
What is a Gray Box Penetration Test?
The terms black box, white box, or gray-box are used to classify a type of penetration test in the ...
Continue Reading
Gray Box vs White Box vs Black Box
Every penetration test emulates an adversary to assess the security controls of the target systems. ...
Continue Reading
Penetration Test FAQs (Frequently Asked Questions)
If you are new to the business of conducting penetration tests, then you may have a lot of ...
Continue Reading