Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
Guide to Modern Penetration Testing Infrastructure
TCM’s pentest lead Aaron Wilson covers hardware, software, report templates, and other infrastructure considerations that make a pentest firm run smoothly.
SOC Tools Every Analyst Should Know
This blog will dive into the general categories of SOC tools and techniques crucial for succeeding as an analyst and list a few specific examples.
How to Learn Assembly: Beginner Project
Start learning the assembly coding language with a simple project by following the steps as we break the code down into manageable sections.
What is Cross-Site Scripting (XSS)?
OverviewCross-Site Scripting (XSS) is a type of security vulnerability in web applications that enables an attacker to insert malicious code into a web page that can be viewed by other users (typically in the form of scripts). When a web application fails to properly...
Manual vs Automated Code Review
This article explores the differences between automatic and manual code review and some of the pros and cons surrounding both approaches.
Which Role is Right For You?
This article reviews some of the technical roles that exist within the cybersecurity space to help you determine what career track is right for you.
Kali Purple – Thoughts from a Penetration Tester
Kali Linux is a popular penetration testing and ethical hacking distribution built from the Linux Operating System. Learn about the latest Kali Purple version.
What is Threat Modeling and Why You Should Use it
Threat modeling is a process used to identify potential threats and weaknesses in a system. Learn more about how to use it to protect your business.
How to Get Started with Code Review
Code review is an essential part of the web application penetration testing process but is often overlooked. We’re going to look at why it’s important and how to get started. There are a number of reasons why we might decide to review the source code of an application...
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.







