asdf

12345678910111213141516171819
Across
  1. 3. An encryption technique named after a well-known Roman politician.
  2. 5. With this popular office device, anyone in the office can be a DJ.
  3. 10. In most organizations, the weakest link in security is the ______.
  4. 11. Platform used for tracking goals and key results.
  5. 12. A sequence of words or text used instead of a password.
  6. 15. Make decisions. Make mistakes. Just take the initiative and orient to ______.
  7. 16. A popular password cracking tool.
  8. 17. In the summer of 2015, interns at Praetorian build an IOT fingerprinting device out of a Raspberry Pi. The next step, naturally, was to attach the Pi to one of these.
  9. 19. Our application penetration testing is closely aligned with the Application Security Verification Standard, created and maintained by this organization.
Down
  1. 1. Praetorian's secure messaging platform, developed in-house and used for communicating sensitive information to clients.
  2. 2. AppSec's proxy tool of choice.
  3. 4. A popular framework developed by Rapid7 used for internal network penetration testing.
  4. 6. In 2017, Praetorian hired our first ever Chief ______ Officer.
  5. 7. The machine in the breakroom that none of us could live without.
  6. 8. The Roman Senate and People.
  7. 9. There are two main types of cross-site scripting: Stored XSS and ______ XSS.
  8. 11. The platform used for secure file storage.
  9. 13. The name of Praetorian's latest web-based platform, which offers security as a service.
  10. 14. The HipChat emoji that means it's time for lunch.
  11. 18. One of Praetorian's core values is to default to ______.