Security Recommendations

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Security Recommendations

  • Password Length: More than Just a Question of Compliance

    Password Length: More than Just a Question of Compliance

    By Brian Tant Password length requirements are a key part of password security, but, with PCI, NIST, OWASP, and CIS offering different recommendations, what length is best? June 4, 2024
  • SOC 2 Compliance

    SOC 2 Compliance: Is it Right for Your Organization?

    By Bonnie Smyre SOC 2 is a compliance and privacy standard that outlines how to manage customer data & related systems to ensure confidentiality, integrity, and availability. May 21, 2024
  • Raxis Achieves SOC 2 Type 2 Compliance

    Raxis Achieves SOC 2 Type 2 Compliance

    By Mark Puckett We are thrilled to announce that Raxis has successfully achieved SOC 2 Type 2 compliance, providing assurance to our clients that their data is handled securely May 14, 2024
  • You See a Wireless Mouse. We see an easy way in.

    What to Expect with a Raxis Wireless Penetration Test

    By Scottie Cole Wireless attacks are typically low-risk, high-reward opportunities that don’t often require direct interaction. See more about a wireless penetration test. September 6, 2022
  • Simultaneous Sessions

    Why We Take Simultaneous Sessions Seriously on Penetration Tests

    By Raxis Research Team Raxis Lead Penetration Tester Matt Dunn explains why you simultaneous sessions is a significant finding on a penetration test. April 8, 2022
  • CIS vs. NIST

    CIS vs. NIST: Understanding Cybersecurity Standards and Frameworks

    By Brian Tant Raxis’ CTO Brian Tant discusses two important gap analysis tools security professionals use to assess cyber defenses: CIS 18 and NIST 800-53. January 7, 2022