Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
AI Assisted Pentest Reporting
In this blog, we’ll show how to generate pentest finding templates with DeepSeek AI using MITRE’s Common Weakness Enumeration (CWE) categories.
Free Cybersecurity Courses: Where To Begin
Can you learn cybersecurity for free? Here are some things to consider as well as a list of resources for cybersecurity beginners.
How Can PCI DSS Compliance Prevent Data Breaches?
In this blog, we will take a look at how PCI DSS compliance standards actually stack up against threat actors general tactics, techniques, and procedures.
Ethical Hacker Gift Guide 2024
The staff at TCM Security have offered some suggestions for those looking to buy gifts for ethical hackers this holiday season.
PimpMyKali (PMK) v 2.0 Release
Pimpmykali is a tested post-installation automation script that takes the headache, research, and guesswork out of proper Kali installation and tuning.
How to Pass the PIPA Certification Exam
Practical IoT Pentest Associate (PIPA) certification creator Andrew Bellini shares his insider tips for passing the PIPA exam.
TCM Security Announces Certification Realignment
TCM Security is making some changes to the naming conventions of our certifications to better align with the job market and hiring manager preferences.
Reverse Engineering and Exploiting Binaries: Hardware Hacking Part 4
In part four of our series on getting started with iot and hardware hacking, we explore reverse engineering and binary exploitation.
Start Your Cyber Career on the Help Desk
One way to break into cybersecurity is working the help desk. This article reviews how the skills learned on the help desk translate to a cybersecurity career.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








