Discover expert-led penetration testing insights, real-world attack simulations, and best practices to uncover vulnerabilities and strengthen your security.
Here’s How Hackers Can Get Through Your Doors and Onto Your Network
Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started.
Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself.
Raxis COO Bonnie Smyre was honored to be invited to write a guest blog post for NTEN, the Nonprofit Technology Network, about understanding security risks.
Raxis’ Brian Tant explains the worst thing to do with negative pentest results is to ignore them & why taking action thwarts hackers & increases your security.
Raxis Lead Developer, Adam Fernandez, has developed a tool to use for testing JSON-based REST APIs, and we’re sharing this tool on GitHub to help API developers test their own code during the SDLC process and to prepare for third-party API penetration tests.
Raxis VP of Business Development discussed pentesting as a helpful tool. CISO’s need not fear “failing” a pentest… there is no failure worse than not know your vulnerabilities until it is too late.
While security gear is an important part of keeping your company secure, Raxis CEO Mark Puckett discusses why it’s not all that is necessary to keep you safe from the latest threats.
Many people seem confused when it comes to understanding the difference between a vulnerability scan and a penetration test. In this article Raxis VP of Business Development Brad Herring examines the differences between the two and helps guide you with decision points in making the right choice for your needs.
Raxis VP of Business Development looks back on 2016 and discusses current vulnerabilities and why your company should do more than the minimum required to stay secure.
Raxis VP of Business Development Brad Herring discusses ways to protect your company from ransomware and how to be prepared in the event an attack occurs against your company.