Raxis Blog Posts By Author

  • Working mom with small child in her lap
    Remote Security Series: Protect Your Network Health Like Your Own
    Raxis VP of Business Development Brad Herring discusses what companies can do to make their remote workers — and themselves — more secure.
  • Raxis presenting at (ISC)² Atlanta Chapter Meeting
    Raxis Presents at the (ISC)² Atlanta Chapter Meeting
    Raxis was honored to present at the (ISC)² Atlanta Chapter Meeting last Thursday. The topic was Social Engineering and understanding how the high success rates of social engineering impacts network security.
  • Penetration Testing is a Critical Tool For Your Business
    Penetration Testing is a Critical Tool For Your Business
    Raxis VP of Business Development discussed pentesting as a helpful tool. CISO’s need not fear “failing” a pentest… there is no failure worse than not know your vulnerabilities until it is too late.
  • Vulnerability Scan Vs Penetration Test: What's The Difference
    Vulnerability Scan Vs Penetration Test: What’s The Difference
    Many people seem confused when it comes to understanding the difference between a vulnerability scan and a penetration test. In this article Raxis VP of Business Development Brad Herring examines the differences between the two and helps guide you with decision points in making the right choice for your needs.
  • Access Denied
    Rising Above The Minimum Cyber Security
    Raxis VP of Business Development looks back on 2016 and discusses current vulnerabilities and why your company should do more than the minimum required to stay secure.
  • Low Battery
    Public USB Charging Ports & Their Potential Security Risks
    Raxis VP of Business Development Brad Herring discusses the risks associated with using public USB charging ports.
  • Aerial Drones - A New Frontier for Hackers?
    Aerial Drones – A New Frontier for Hackers
    Raxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company.
  • Pirate Flag: We have your data. Pay us or we will delete it all.
    Ransomware – What you can do to avoid being a victim
    Raxis VP of Business Development Brad Herring discusses ways to protect your company from ransomware and how to be prepared in the event an attack occurs against your company.
  • Fingerprint on keyboard
    The Weakest Link in the Password Hash
    Raxis VP of Business Development explains easy rules to use to make your passwords more secure and harder for hackers to crack.
  • Person looking at 0s and 1s
    The Human Element is Often the Weakest Link
    Raxis VP of Business Development Brad Herring discusses social engineering and how many hackers take the easy path & trick employees into giving them access.

Raxis Attack

Continuous, expert-led PTaaS combined with advanced automation to uncover and address hidden vulnerabilities, ensuring your business stays ahead of evolving cyber threats while maintaining regulatory compliance.

Raxis Protect

Continuous vulnerability scanning, real-time asset management, and expert guidance to proactively identify and address security gaps across your entire digital ecosystem, ensuring 24/7 protection against evolving cyber threats.

Raxis Strike

Tailored, expert-led penetration testing that uncovers hidden vulnerabilities using real-world hacker techniques, providing actionable insights to strengthen your defenses and protect against sophisticated cyber threats.

Partner With Raxis

Partnering with Raxis empowers your business with elite penetration testing services, competitive reseller pricing, and recurring revenue opportunities, all backed by a proven track record of excellence and a commitment to staying ahead of evolving cybersecurity threats.