by Josh Daniels | Feb 12, 2025 | Learning, Penetration Testing
What is the purpose of a pentester certification? What should you know? What should you be able to do? If you pass a TCM exam, you can rest assured that you can do what a pentester does – because you did it during the exam. Our associate-level pentest exam, The...
by TCMS Staff | Feb 5, 2025 | Penetration Testing
One of the most common questions that can directly impact an organization’s cybersecurity posture is “How often should we do a pentest?” It’s a fair question because managing cybersecurity isn’t just about checking boxes – it’s also about protecting your business in a...
by Heath Adams | Jan 2, 2025 | Penetration Testing
Overview Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take...
by Josh Daniels | Jan 1, 2025 | Penetration Testing
Should Social Engineering Be In-Scope For An External Pentest? The short answer is yes; social engineering should be included in the scope of any serious external penetration test. Any test of the perimeter defense of an organization’s network without social...
by Aaron Wilson | Oct 4, 2024 | Penetration Testing
What separates a good guy (white hat) from a bad guy (black hat)? The bad guy will either hack you for profit or hold your information for ransom in exchange for monetary gain or brand damage. The good guy will tell you what is insecure about your company, and most...
by Aaron Wilson | Aug 28, 2024 | Penetration Testing
What are the ways that you can start to understand the niche field of Mobile Application Penetration Testing? This blog series will explain some of the best tools and mobile apps you can use today to start learning about this exciting field. Introduction: What is...