Raxis Blog Posts By Author
-
Remote Security Series: Protect Your Network Health Like Your OwnRaxis VP of Business Development Brad Herring discusses what companies can do to make their remote workers — and themselves — more secure.
-
Raxis Presents at the (ISC)² Atlanta Chapter MeetingRaxis was honored to present at the (ISC)² Atlanta Chapter Meeting last Thursday. The topic was Social Engineering and understanding how the high success rates of social engineering impacts network security.
-
Penetration Testing is a Critical Tool For Your BusinessRaxis VP of Business Development discussed pentesting as a helpful tool. CISO’s need not fear “failing” a pentest… there is no failure worse than not know your vulnerabilities until it is too late.
-
Vulnerability Scan Vs Penetration Test: What’s The DifferenceMany people seem confused when it comes to understanding the difference between a vulnerability scan and a penetration test. In this article Raxis VP of Business Development Brad Herring examines the differences between the two and helps guide you with decision points in making the right choice for your needs.
-
Rising Above The Minimum Cyber SecurityRaxis VP of Business Development looks back on 2016 and discusses current vulnerabilities and why your company should do more than the minimum required to stay secure.
-
Public USB Charging Ports & Their Potential Security RisksRaxis VP of Business Development Brad Herring discusses the risks associated with using public USB charging ports.
-
Aerial Drones – A New Frontier for HackersRaxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company.
-
Ransomware – What you can do to avoid being a victimRaxis VP of Business Development Brad Herring discusses ways to protect your company from ransomware and how to be prepared in the event an attack occurs against your company.
-
The Weakest Link in the Password HashRaxis VP of Business Development explains easy rules to use to make your passwords more secure and harder for hackers to crack.
-
The Human Element is Often the Weakest LinkRaxis VP of Business Development Brad Herring discusses social engineering and how many hackers take the easy path & trick employees into giving them access.
Raxis Attack
Continuous, expert-led PTaaS combined with advanced automation to uncover and address hidden vulnerabilities, ensuring your business stays ahead of evolving cyber threats while maintaining regulatory compliance.
Raxis Protect
Continuous vulnerability scanning, real-time asset management, and expert guidance to proactively identify and address security gaps across your entire digital ecosystem, ensuring 24/7 protection against evolving cyber threats.
Raxis Strike
Tailored, expert-led penetration testing that uncovers hidden vulnerabilities using real-world hacker techniques, providing actionable insights to strengthen your defenses and protect against sophisticated cyber threats.
Partner With Raxis
Partnering with Raxis empowers your business with elite penetration testing services, competitive reseller pricing, and recurring revenue opportunities, all backed by a proven track record of excellence and a commitment to staying ahead of evolving cybersecurity threats.