 
							
					
															
					
					 by Josh Daniels | Aug 6, 2025 | PCI-DSS
Compliance with cyber security standards sometimes gets a bad rap as a check box that organizations tick off without any real concern for the efficacy of the measures taken to meet those standards. While this can be the case, the requirements of some standards, when...				
					
			
					
											
								 
							
					
															
					
					 by Josh Daniels | Jul 23, 2025 | Penetration Testing
One of the first technical needs of a pentester at the outset of an engagement is access, and one of the best ways to gain access is through collecting and cracking password hashes of valid user accounts. The complexity of this process can vary depending on factors...				
					
			
					
											
								 
							
					
															
					
					 by Josh Daniels | Jun 11, 2025 | Penetration Testing
When you’re on a penetration test, the tools you bring with you can make all the difference. Whether you’re attacking a web app, performing reconnaissance on a new target, or even picking a lock during a physical engagement, having the right resources can mean the...				
					
			
					
											
								 
							
					
															
					
					 by Josh Daniels | Jun 4, 2025 | PCI-DSS
Integrating PCI DSS Auditing and Penetration Testing Most large businesses, or those that handle payment processing in-house, are subject to the penetration test requirement for PCI DSS compliance. This article will clear up which organizations need penetration tests,...				
					
			
					
											
								 
							
					
															
					
					 by Josh Daniels | May 14, 2025 | Learning, SOC
While TCM has traditionally offered training and certification for offensive security roles, we have expanded our offerings to include practical blue team security analyst training and certification. In cyber security, adopting the mindset of your adversary is a...