secure ideas

Professionally Evil Fundamentals: OWASP Top 10 A9 Components with Known Vulnerabilities

How Do We Prepare for a Penetration Test?

Professionally Evil Fundamentals: HTTP Responses

Improving Application Security with the PCI Software Security Framework

AI as a Security Ally: Harnessing its Potential

Professionally Evil Network Testing Class Introduction

Interview 17 - Eric Kuehn, Secure Ideas - RVAsec 2025

Decoding Cyber Defense: Red Team vs Purple Team

Tactical Burp Suite 2.0

Real World Web Penetration Testing - Webcast

Professionally Evil Fundamentals: HTTP Status Codes

Cybersecurity 101: If You Don’t Have MFA, Go Home. #podcast

From Code to Cloud Strengthening IaC Security with SAST

Professionally Evil Fundamentals: Burp Suite

Professionally Evil Fundamentals: What is OWASP

What Are the Different Types of Penetration Tests? #cybersecurity #education

AWS Policies

Professionally Evil Fundamentals: OWASP Top 10 A2 Broken Authentication

How are findings ranked?

From Confusion to Clarity: Web Application Attack Classification with BILE Webcast

Professionally Evil Fundamentals: OWASP A4 XXE

What are the risks of a Penetration Test?

Professionally Evil Fundamentals: OWASP Top 10 A8 Insecure Deserialization

CyberScream - Hacking Like a Ghostface Promo (Secure Ideas)