Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
Networking Fundamentals for Pentesters
We will take a look at networking concepts you should focus on, why they matter, and resources for learning for beginning pentesters without an IT background.
Guide to Modern Penetration Testing Infrastructure
TCM’s pentest lead Aaron Wilson covers hardware, software, report templates, and other infrastructure considerations that make a pentest firm run smoothly.
How AI Threatens Security Operations
The development of AI has produced benefits for security operations, but also accelerated the capabilities and scale of threat actors.
Invaluable Log Analysis Tools: Sed, Awk, Grep, and RegEx
Enhance your log analysis skills by utilizing legacy tools like sed, awk, grep, and regex to automate and streamline processes.
What is a Penetration Testing Report?
We review what goes into a penetration testing report and walk you through a demo report that represents what we share with our pentesting clients.
Top 5 SOC Analyst Certifications for 2024
Do you want to be a SOC Analyst? If you are considering a certification, review your options and pick a path that aligns with your goals and study preferences.
Why Mental Health is Crucial for Career Success
Explore the career benefits of focusing on your mental health. Mentally healthy individuals benefit from enhanced productivity, creativity, and resilience.
TCM Security Academy Announces Free Tier
TCM Security is thrilled to announce a new free tier in the TCM Security Academy featuring over 25 hours of FREE on-demand video training. Starting on Wednesday, September 25, 2024, students of all backgrounds will be able to access this beginner friendly content for...
Strategies for Effective Time Management
Using a Kanban board is an effective way to manage tasks and increase your productivity. Check out our tips to improve your time management skills.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








