Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
Ethically Hack AI | Part 2 – Prompt Injection
This blog will demonstrate how various methods of prompt injection, including jailbreaking, can be used to compromise AI chatbots during ethical testing.
AI-Automated Credential Stuffing
Credential stuffing remains one of the most efficient paths to account takeover, and AI assistance is changing the scale and effectiveness of those attacks.
OSINT Resources and Tools
Explore some of the fundamental domains of OSINT research, plus a list of tools and resources to develop this discipline as a cyber security professional.
How To Pass The PHDA Exam
The creator of the Practical Help Deck Associate certification gives helpful tips for taking this unique, beginner friendly assessment of entry-level IT skills.
Professional Pentester Toolbox: TCM Security Picks
We asked the TCM Security team to share the pentest tools they rely on regularly for testing internal, external, web application, and physical environments.
PCI DSS Compliance and Pentesting
Learn which organizations need penetration tests for PCI DSS compliance and how consulting with one company for both can streamline the process.
Four Must-Haves for Effective Penetration Testing
The true value of a pentest lies in the actionable insights and collaboration with your pentest team. Here are four critical elements you should never skip.
PCI DSS 4.0: What’s New and How Your Business Can Stay Compliant
Learn more about the most recent updates to the PCI DSS, how version 4.0 compares to 3.2.1, and what you need to do to be PCI compliant.
TCM SOC Analyst Certification Roadmap
This SOC analyst certification roadmap from TCM will help you develop and prove defensive cyber security skills, from beginner to advanced.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








