Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
How To Pass The PHDA Exam
The creator of the Practical Help Deck Associate certification gives helpful tips for taking this unique, beginner friendly assessment of entry-level IT skills.
Ethical Hacker Gift Guide 2024
The staff at TCM Security have offered some suggestions for those looking to buy gifts for ethical hackers this holiday season.
PimpMyKali (PMK) v 2.0 Release
Pimpmykali is a tested post-installation automation script that takes the headache, research, and guesswork out of proper Kali installation and tuning.
Do You Need a Penetration Test or Red Team Engagement?
Understand the key differences between Penetration testing and Red Team engagements to ensure that you choose right course of action for your organization.
How to Improve Your External Penetration Testing Results
When on the cusp of receiving an external penetration test, clients want to prepare themselves for it. We often get asked what's the easiest way to improve their score before the engagement has begun. Below are the top 3 ways to improve your external penetration...
What is MFA? Understanding Multi-Factor Authentication
MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, "You need a second thing - what we call a second "factor" - to prove who you are." When logging into your online account, you prove who you are...
The Penny, the Match, and the Camera – OSINT
Our last blog post regarding OSINT and Recon briefly discussed some exciting topics. In this blog post, we will continue with that thread and discuss some tradecrafts used by investigators and Pentesters. Only some investigators and pentesters utilize these exact...
How Open-Source Intelligence Impacts You
OSINT OSINT stands for Open-Source Intelligence. It is the action of gathering information that is publicly available and analyzing it for intelligence purposes. First, let's look at what type of data can be considered Open-Source. Data or information that is...
How Hackers Target You
When creating a defensive plan against cyber-attacks, knowing your adversary is paramount. Often after the shock has worn off from a breach, the affected company will ask themselves, "Why us?". It's a valid question that organizations should ask before an incident...
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








