Blogs & Articles
Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials
How to Pass the Practical SOC Analyst Associate (PSAA) Exam
PJSA and SOC 101 creator Andrew Prince shares his advice for how to prepare for and pass the Practical Junior Security Analyst certification exam.
How to Be an Ethical Hacker in 2025
Learn more about the topics, skills, and tools you should learn if you are interested in becoming an ethical hacker or penetration tester in 2025.
Why Mindset Matters: Unlocking Your Potential
Adopting a productive mindset is important in our personal and professional development. Discover the benefits of embracing a growth mindset.
The Role of Phishing Simulations in Security Awareness Training
Organizations can integrate phishing simulations into their security awareness training to help employees recognize potential phishing attempts.
Teaching Kids Cyber Security Concepts with Bluey
We will take a look at two episodes of the show, Bluey, and how they can be used to explain cybersecurity concepts in a way that kids will understand.
Persevering in a Challenging Cybersecurity Job Market
What is Perseverance? Perseverance: persistence in doing something despite difficulty or delay in achieving success. Ironically, I started writing this blog a couple months ago and initially struggled to get some momentum. No two people reading this are alike, but...
How to Use Social Media for Cybersecurity Networking
I know as you read this, the word “networking” has likely sent your eyeballs rolling. For better or for worse, networking has become a necessity in today’s job market - and cybersecurity is no different. In the last decade of working in cybersecurity, I have found...
Preventing Burnout in the Cybersecurity Field
We can’t defend against cyber threats if we’re dealing with burnout. In this article, we explore the signs and discuss practical strategies to prevent burnout.
Invaluable Log Analysis Tools: Sed, Awk, Grep, and RegEx
Enhance your log analysis skills by utilizing legacy tools like sed, awk, grep, and regex to automate and streamline processes.
What is a Penetration Testing Report?
We review what goes into a penetration testing report and walk you through a demo report that represents what we share with our pentesting clients.
Penetration Testing – PCI Compliance – Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.