fbpx
How To Identify URL Phishing Techniques

How To Identify URL Phishing Techniques

In 2025, phishing is still one of the most ubiquitous and effective attack vectors cybercriminals use to steal credentials, distribute malware, and compromise organizations. Oftentimes, these phishing campaigns stem from deceptive URLs which are crafted to appear...
How to Pass a SOC 2 Audit

How to Pass a SOC 2 Audit

I often hear from people that audits are “brutal” and that passing a SOC 2 audit is a significant accomplishment. Most people I talk to feel that an audit is a burden and that passing it takes a lot of extra, unnecessary effort. At TCM Security, we...
Three Ways to Write More Secure Code

Three Ways to Write More Secure Code

Overview With application security being a critical component of most organizations defenses, development teams must be proactive to safeguard their applications. This article delves into three fundamental practices to enhance security: viewing every user through a...