Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer
    Exploits | Penetration Testing | Security Recommendations

    Here’s How Hackers Can Get Through Your Doors and Onto Your Network

    ByBrian Tant June 12, 2020July 28, 2025

    Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started.

    Read More Here’s How Hackers Can Get Through Your Doors and Onto Your NetworkContinue

  • Canned air attack
    Exploits | Penetration Testing | Security Recommendations

    Can This Simple Trick Outwit Your Smart Security?

    ByBrad Herring June 5, 2020

    Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself.

    Read More Can This Simple Trick Outwit Your Smart Security?Continue

  • Hand using plastic card to open a locked door
    Exploits | In The News | Patching | Security Recommendations

    Windows 10 Vulnerability Highlights Need for Physical Security Testing

    ByRaxis Research Team May 28, 2020July 28, 2025

    A Windows 10 security problem offers an excellent example of what can happen when a bad guy gets to spend a few minutes alone with your computer.

    Read More Windows 10 Vulnerability Highlights Need for Physical Security TestingContinue

  • Scientist putting a specimen in a test tube
    Exploits | In The News | Security Recommendations

    Pharma Breaches and the Terrifying Prospect of Data Manipulation

    ByBrian Tant May 14, 2020July 28, 2025

    Raxis CTO Brian Tant shares his thoughts on cybersecurity threats to the pharma industry and what pharma companies can do to protect themselves.

    Read More Pharma Breaches and the Terrifying Prospect of Data ManipulationContinue

  • Laptop with VPN on
    Networks | Security Recommendations | Tips For Everyone

    Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s Why

    ByBrian Tant May 1, 2020July 28, 2025

    Raxis CTO Brian Tant discusses how VPNs protect our most critical data and why your company should require a VPN for remote access.

    Read More Notes From a Hacker: Yes, You Have to Use Your VPN – and Here’s WhyContinue

  • Shawn Ireland interviews Raxis COO Bonnie Smyre on Ohio’s Fox 28's morning show
    In The News | Raxis In The Community | Security Recommendations | Tips For Everyone

    Raxis COO Shares WFH Cybersecurity Tips on Columbus, Ohio’s Fox 28

    ByMark Puckett April 14, 2020July 28, 2025

    Raxis’ Bonnie Smyre spoke to Shawn Ireland of Columbus Ohio’s Good Day Marketplace about staying secure during the pandemic.

    Read More Raxis COO Shares WFH Cybersecurity Tips on Columbus, Ohio’s Fox 28Continue

  • Working mom with small child in her lap
    In The News | Security Recommendations

    Remote Security Series: Protect Your Network Health Like Your Own

    ByBrad Herring April 10, 2020July 28, 2025

    Raxis VP of Business Development Brad Herring discusses what companies can do to make their remote workers — and themselves — more secure.

    Read More Remote Security Series: Protect Your Network Health Like Your OwnContinue

  • Working dad holds baby while reading his laptop
    In The News | Security Recommendations

    Remote Security Series: Urgent Questions You’ll Face About VPN and Remote Access

    ByRaxis Research Team April 3, 2020July 28, 2025

    Raxis answers critical questions as companies work to setup secure VPN solutions that can handle the increased workload of remote work during the covid-19 pandemic.

    Read More Remote Security Series: Urgent Questions You’ll Face About VPN and Remote AccessContinue

  • Woman with dog working on laptop
    In The News | Security Recommendations

    Remote Security Series: Review Remote Workforce Policies

    ByBrian Tant March 27, 2020January 17, 2025

    Raxis CTO Brian Tant discusses updates to workforce policies that are needed to safeguard company and customer data in the wake of the covid-19 pandemic.

    Read More Remote Security Series: Review Remote Workforce PoliciesContinue

  • Woman holding baby and working on laptop
    In The News | Phishing | Security Recommendations

    Remote Security Series: Stay ahead of the phishing attacks that follow COVID-19

    ByBonnie Smyre March 20, 2020July 28, 2025

    In the wake of the covid-19 pandemic, the Raxis penetration testing team offers advice to protect your employees from phishing attacks.

    Read More Remote Security Series: Stay ahead of the phishing attacks that follow COVID-19Continue

  • Woman with padlocks
    Penetration Testing | Security Recommendations | Tips For Everyone

    Helping Nonprofits and Other Growing Businesses Understand Security Risks

    ByBonnie Smyre August 27, 2018July 28, 2025

    Raxis COO Bonnie Smyre was honored to be invited to write a guest blog post for NTEN, the Nonprofit Technology Network, about understanding security risks.

    Read More Helping Nonprofits and Other Growing Businesses Understand Security RisksContinue

  • Top Five Actions NOT to Take When Your Pentest Results are High Risk
    Penetration Testing | Security Recommendations

    Top Five Actions NOT to Take When Your Pentest Results are High Risk

    ByBrian Tant June 19, 2018July 28, 2025

    Raxis’ Brian Tant explains the worst thing to do with negative pentest results is to ignore them & why taking action thwarts hackers & increases your security.

    Read More Top Five Actions NOT to Take When Your Pentest Results are High RiskContinue

Page navigation

Previous PagePrevious 1 … 4 5 6

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube