Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
What Happened When We Invited Hackers to Break our AI Chatbot
In November we hosted an AI Hacking CTF Challenge as part of TCM’s annual Black Friday Sale. The challenge was straightforward: convince the chatbot to reveal the secret code that it knew, but was instructed to keep secret. For some contestants it was simple, they had...
How To Become A SOC Analyst
This blog explores the duties of a SOC analyst, lasting motivations for pursuing defensive cyber security, and resources to get started and progress in the SOC.
Network VS Cloud Penetration Testing
This article defines cloud pentesting, explores the relationship between traditional network and cloud pentesting, and explains how to learn cloud pentesting.
Why Red Team Should Learn Blue Team Skills
Blue team skills can benefit a penetration tester with sharper offensive capabilities, stronger collaboration with defenders, and more career versatility.
The PNPT: Pentest Experience Certification
The PNPT is designed to provide knowledge and practical experience in penetration testing to help shorten the experience gap for those looking for jobs.
Ethically Hacking LLMs | 1 – Neural Networks
In this first blog in the series, we’re going to learn about the fundamentals of how neural networks and LLMs work to better understand how to attack them.
Free Cybersecurity Courses: Where To Begin
Can you learn cybersecurity for free? Here are some things to consider as well as a list of resources for cybersecurity beginners.
How Can PCI DSS Compliance Prevent Data Breaches?
In this blog, we will take a look at how PCI DSS compliance standards actually stack up against threat actors general tactics, techniques, and procedures.
TCM Security Announces Updates to Live Training Offerings
In response to feedback from our community, the TCM Security team is pleased to announce some changes to our live training offerings to make certification prep more accessible and set every student up for success on their cybersecurity credentialing journeys! ...
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








