Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials
Getting Started with Kali Linux: Installation Guide and Tips for Beginners
Kali Linux is an essential tool for ethical hackers! Learn how to install it and PimpMyKali and get started with our tips for beginners.
Intro To Car Hacking: Replay Attacks
Learn how to build an inexpensive mock keyless entry system and Raspberry Pi replay attack device to simulate modern car hacking without breaking the law.
Application Security 101: Basics, Best Practices, & Challenges
This article reviews the key concepts and principles of application security, providing an overview for developers, IT professionals, and business leaders.
Getting Started with IoT and Hardware Hacking: Part 3 – Analyzing and Enumerating Firmware
In part three of our intro to hardware hacking series, we learn about firmware analysis and how to hunt for vulnerabilities on IoT devices.
How to Pass the Practical SOC Analyst Associate (PSAA) Exam
PJSA and SOC 101 creator Andrew Prince shares his advice for how to prepare for and pass the Practical Junior Security Analyst certification exam.
How to Be an Ethical Hacker in 2025
Learn more about the topics, skills, and tools you should learn if you are interested in becoming an ethical hacker or penetration tester in 2025.
Why Mindset Matters: Unlocking Your Potential
Adopting a productive mindset is important in our personal and professional development. Discover the benefits of embracing a growth mindset.
The Role of Phishing Simulations in Security Awareness Training
Organizations can integrate phishing simulations into their security awareness training to help employees recognize potential phishing attempts.
Teaching Kids Cyber Security Concepts with Bluey
We will take a look at two episodes of the show, Bluey, and how they can be used to explain cybersecurity concepts in a way that kids will understand.
Persevering in a Challenging Cybersecurity Job Market
What is Perseverance? Perseverance: persistence in doing something despite difficulty or delay in achieving success. Ironically, I started writing this blog a couple months ago and initially struggled to get some momentum. No two people reading this are alike, but...
Penetration Testing – PCI Compliance – Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.