Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials
Coding Projects for Beginners
This blog post will provide some tips and suggest a few project ideas to help you acquire and develop programming skills to advance your coding abilities.
Introduction To Digital Privacy
This article contains actionable steps and resources to help you practice digital privacy, stop data brokers from collecting your information, and restore a sense of freedom and peace of mind.
TCM Pentester Certification Roadmap
How can you become a pentester? Follow TCM’s learning path and go from no IT experience to a professional penetration tester.
How Often Should You Have A Pentest?
Most organizations will need at least one pentest annually, but some more frequent pentesting can be beneficial for finding vulnerabilities and reducing risk.
OWASP Top 10 Prediction | 2025
In this blog, we will make a prediction about the OWASP Top Ten for 2025 by taking a look at CVE data from 2021 through 2024.
Python vs C# – A Pentester Perspective
Python is arguably the preferred language of the hacking community, but I will explain how learning C# makes you a more versatile and in-demand ethical hacker.
SOC Tools Every Analyst Should Know
This blog will dive into the general categories of SOC tools and techniques crucial for succeeding as an analyst and list a few specific examples.
How to Learn Assembly: Beginner Project
Start learning the assembly coding language with a simple project by following the steps as we break the code down into manageable sections.
Differences Between a Vulnerability Scan and a Penetration Test
Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take a look at the key differences between the two options and paint a clearer picture on what option you should choose for your company.
Social Engineering And External Pentests
In this article, we will explore the benefits and drawbacks of social engineering and how to best include this tactic when defining the scope of an external pentest.
Penetration Testing – PCI Compliance – Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.