document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

Category: Blogs

Rosie Anderson
In Part 2 of her Cyber ROI blog series, Rosie Anderson explains how you can help ensure effective cyber spend by identifying your threat profile.
December 2, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 28, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 21, 2024
Jan Masters
In this new blog series about JWT security, Jan Masters gives us an introduction to this popular authentication tool.
November 18, 2024
Eliza-May Austin
This week on Eliza’s Cyber Security Book Club, she covers “Black Hat Python: Python Programming for Hackers and Pentesters” by Justin Seitz.
October 31, 2024
Eliza-May Austin
Have you heard of FrankenSOC? In this blog, our CEO, Eliza-May Austin, shares more info about our monster SOC, and how the name came about.
October 28, 2024
Eliza-May Austin
“Effective Threat Investigation for SOC Analysts ” by Mostafa Yahia is next up on Eliza’s Cyber Security Book Club.
October 24, 2024
th4ts3cur1ty.company - Ella
Do your non-technical colleagues really need cyber security training? Ella Jennings certainly thinks so. Find out why we should all be taking cyber security very seriously.
October 21, 2024
Rosie Anderson and Eliza-May Austin
Rosie Anderson and Eliza-May Austin offer up some FrankenSOC use cases, outlining a wide variety of situations where TSC can provide a dedicated SOC to help you manage your own SIEM.
October 14, 2024
Eliza-May Austin
As Halloween approaches TSC’s CEO, Eliza-May Austin, talks Zombie Files, Ghost Files, and the ghoulish hackers who exploit them.
October 7, 2024