by TCMS Staff | Aug 2, 2024 | IoT and Hardware Hacking
Introduction This blog is part 2 in the series “Getting Started with IoT and Hardware Hacking.” In part 1, we covered some core fundamentals and how to build an affordable toolkit of IoT and hardware hacking gear. If you missed that post, make sure to check it out. ...
by TCMS Staff | Jul 26, 2024 | Learning
0. Overview Note taking is an essential skill that is often under-appreciated by those who are setting out on their cybersecurity journeys. This blog post offers practical advice for students looking for better ways to absorb and retain information they learn in our...
by TCMS Staff | Jul 24, 2024 | Programming
Automating Everything Scripting is often the gateway to programming. If you have a repetitive, time-consuming task that needs to be performed regularly, you have likely wondered if there is a more efficient solution. I’m here to tell you that there is, and that...
by TCMS Staff | Jul 19, 2024 | Web Applications
0. Overview Web applications actively facilitate business operations, allowing businesses to interact with customers, streamline processes, and deliver crucial services over the internet. Cyber attackers often focus on these applications because of their online...
by TCMS Staff | Jul 17, 2024 | Career Advice
Throughout my cybersecurity career, I’ve reviewed what I imagine is hundreds of resumes – and I still have several sitting in my review queue. I’ve done this as a professional responsibility, a freelance offering, and as a pro-bono activity for volunteer...