asdf
Across
- 3. An encryption technique named after a well-known Roman politician.
- 5. With this popular office device, anyone in the office can be a DJ.
- 10. In most organizations, the weakest link in security is the ______.
- 11. Platform used for tracking goals and key results.
- 12. A sequence of words or text used instead of a password.
- 15. Make decisions. Make mistakes. Just take the initiative and orient to ______.
- 16. A popular password cracking tool.
- 17. In the summer of 2015, interns at Praetorian build an IOT fingerprinting device out of a Raspberry Pi. The next step, naturally, was to attach the Pi to one of these.
- 19. Our application penetration testing is closely aligned with the Application Security Verification Standard, created and maintained by this organization.
Down
- 1. Praetorian's secure messaging platform, developed in-house and used for communicating sensitive information to clients.
- 2. AppSec's proxy tool of choice.
- 4. A popular framework developed by Rapid7 used for internal network penetration testing.
- 6. In 2017, Praetorian hired our first ever Chief ______ Officer.
- 7. The machine in the breakroom that none of us could live without.
- 8. The Roman Senate and People.
- 9. There are two main types of cross-site scripting: Stored XSS and ______ XSS.
- 11. The platform used for secure file storage.
- 13. The name of Praetorian's latest web-based platform, which offers security as a service.
- 14. The HipChat emoji that means it's time for lunch.
- 18. One of Praetorian's core values is to default to ______.