CTF-CW7
Across
- 2. Logbook tracking all the data-handling jobs run by a company
- 4. Strangers checking under the rug
- 7. Tekion’s online bouncer from Akamai—blocking cyber troublemakers at the front door!
- 9. Sewing up another digital rip
- 11. Hacking your way up the office ladder
- 13. Hide-and-seek champ, cybersecurity edition
- 15. Hiding credit card details with asterisks in statements
- 17. Swaggers in so every Tekion API gets its time to shine!
- 18. Give it a spin before you buy—or face the judge!
- 19. Security’s version of duct-taping a leak
- 20. The recipe card for fixing cyber messes
Down
- 1. Data from your system’s fitbit
- 3. Mixing up data to make it hard to interpret
- 5. The “no free hugs” approach to access
- 6. New European law aiming to make AI safe, fair, and compliant
- 8. Company’s treasure map
- 10. At Tekion, even buying office supplies is a breeze with this zippy tool!
- 12. Class time for grownups
- 14. Turning secret code into plain gossip
- 16. Letting the bots handle the boring stuff