Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • Cybersecurity: It’s how to say “Yes.”
    Security Recommendations | Tips For Everyone

    Cybersecurity: It’s how to say “Yes.”

    ByMark Puckett December 31, 2024

    Contrary to common misconceptions, cybersecurity acts as a powerful enabler in the digital age, fostering innovation, driving business growth, and empowering organizations to harness technology’s full potential. By building trust, accelerating innovation, enabling emerging technologies, enhancing efficiency, ensuring compliance, supporting remote work, and protecting intellectual property, robust cybersecurity measures create a secure foundation for organizations to thrive and innovate in an increasingly interconnected world.

    Read More Cybersecurity: It’s how to say “Yes.”Continue

  • Accepting Penetration Test Risks & How Compensating Controls Can Help
    Penetration Testing | Security Recommendations

    Accepting Penetration Test Risks & How Compensating Controls Can Help

    ByTim Semchenko December 17, 2024

    Tim Semchenko discusses documenting acceptance of risks and implementing compensating controls as options when pentest findings cannot be fixed immediately.

    Read More Accepting Penetration Test Risks & How Compensating Controls Can HelpContinue

  • Why Raxis Attack is a Huge Win for Organizations
    Penetration Testing | PTaaS | Security Recommendations

    Why Raxis Attack PTaaS is a Huge Win for Organizations

    ByCaroline Kelly October 22, 2024June 16, 2025

    With the recent launch of Raxis Attack, a powerful PTaaS service, Caroline Kelly is excited to share how it can help organizations of all sizes stay secure.

    Read More Why Raxis Attack PTaaS is a Huge Win for OrganizationsContinue

  • The CrowdStrike Outage: Lessons Learned
    In The News | Security Recommendations

    The CrowdStrike Outage: Lessons Learned

    ByScottie Cole July 25, 2024June 2, 2025

    Just a few days ago the world felt the rippling effects of a third-party push to networks across the globe. What would have normally been a routine undertaking instead caused mass disruption of information systems and brought businesses of all sizes to a standstill. Almost everyone was impacted by this incident in one way or…

    Read More The CrowdStrike Outage: Lessons LearnedContinue

  • Cyber Attack Disrupts Car Dealerships
    In The News | Security Recommendations

    Ongoing Cyber Attack Disrupts Car Dealerships

    ByBrian Tant June 21, 2024August 22, 2025

    Wednesday thousands of car dealerships across North America experienced a cyberattack resulting in widespread outages and significant operational degradation.

    Read More Ongoing Cyber Attack Disrupts Car DealershipsContinue

  • Password Length: More than Just a Question of Compliance
    Password Cracking | Security Recommendations | Tips For Everyone

    Password Length: More than Just a Question of Compliance

    ByBrian Tant June 4, 2024August 18, 2025

    Password length requirements are a key part of password security, but, with PCI, NIST, OWASP, and CIS offering different recommendations, what length is best?

    Read More Password Length: More than Just a Question of ComplianceContinue

  • SOC 2 Compliance
    Security Recommendations

    SOC 2 Compliance: Is it Right for Your Organization?

    ByBonnie Smyre May 21, 2024

    SOC 2 is a compliance and privacy standard that outlines how to manage customer data & related systems to ensure confidentiality, integrity, and availability.

    Read More SOC 2 Compliance: Is it Right for Your Organization?Continue

  • Raxis Achieves SOC 2 Type 2 Compliance
    In The News | Security Recommendations

    Raxis Achieves SOC 2 Type 2 Compliance

    ByMark Puckett May 14, 2024

    We are thrilled to announce that Raxis has successfully achieved SOC 2 Type 2 compliance, providing assurance to our clients that their data is handled securely

    Read More Raxis Achieves SOC 2 Type 2 ComplianceContinue

  • You See a Wireless Mouse. We see an easy way in.
    Security Recommendations

    What to Expect with a Raxis Wireless Penetration Test

    ByScottie Cole September 6, 2022

    Wireless attacks are typically low-risk, high-reward opportunities that don’t often require direct interaction. See more about a wireless penetration test.

    Read More What to Expect with a Raxis Wireless Penetration TestContinue

  • Simultaneous Sessions
    Security Recommendations

    Why We Take Simultaneous Sessions Seriously on Penetration Tests

    ByRaxis Research Team April 8, 2022September 5, 2025

    Raxis Lead Penetration Tester Matt Dunn explains why you simultaneous sessions is a significant finding on a penetration test.

    Read More Why We Take Simultaneous Sessions Seriously on Penetration TestsContinue

  • CIS vs. NIST
    Security Recommendations

    CIS vs. NIST: Understanding Cybersecurity Standards and Frameworks

    ByBrian Tant January 7, 2022July 28, 2025

    Raxis’ CTO Brian Tant discusses two important gap analysis tools security professionals use to assess cyber defenses: CIS 18 and NIST 800-53.

    Read More CIS vs. NIST: Understanding Cybersecurity Standards and FrameworksContinue

  • Why they're not the same: Vulnerability Scans and Pentests
    Security Recommendations

    Chained Attacks and How a Scan Can Leave You Vulnerable

    ByTim Semchenko December 10, 2021June 3, 2025

    Vulnerability scans are useful tools for protecting your network. Find out why you shouldn’t rely on them exclusively.

    Read More Chained Attacks and How a Scan Can Leave You VulnerableContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 7 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube