Protecting Your Network With Honeypots

Protecting Your Network With Honeypots

Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...
PimpMyKali (PMK) v 2.0 Release

PimpMyKali (PMK) v 2.0 Release

What is PimpMyKali? PimpMyKali is a post-installation script that automates the setup, customization, and configuration of tooling within Kali Linux. From installing essential penetration test tooling to configuring system settings to streamlining the setup process,...
How to Pass the PIPA Certification Exam

How to Pass the PIPA Certification Exam

Introducing an IoT Testing Certification for Beginners TCM Security’s Practical IoT Pentest Associate (PIPA) is a unique IoT testing certification that requires exam takers to perform hands-on testing of IoT firmware to identify vulnerabilities and write a...
Start Your Cyber Career on the Help Desk

Start Your Cyber Career on the Help Desk

Benefits Of Starting In The Help Desk One question that I frequently hear from folks looking to start their career in IT or cybersecurity is whether or not they should start in a help desk role. In this blog I’m going to outline some of the benefits to starting your...