asdf

12345678910111213141516171819
Across
  1. 2. / In the summer of 2015, interns at Praetorian build an IOT fingerprinting device out of a Raspberry Pi. The next step, naturally, was to attach the Pi to one of these.
  2. 5. / A popular password cracking tool.
  3. 10. / An encryption technique named after a well-known Roman politician.
  4. 11. / Platform used for tracking goals and key results.
  5. 13. / The HipChat emoji that means it's time for lunch.
  6. 14. / With this popular office device, anyone in the office can be a DJ.
  7. 16. / Praetorian's secure messaging platform, developed in-house and used for communicating sensitive information to clients.
  8. 17. / In 2017, Praetorian hired our first ever Chief ______ Officer.
  9. 18. / The machine in the breakroom that none of us could live without.
  10. 19. / One of Praetorian's core values is to default to ______.
Down
  1. 1. / The Roman Senate and People.
  2. 2. / The name of Praetorian's latest web-based platform, which offers security as a service.
  3. 3. / A sequence of words or text used instead of a password.
  4. 4. / AppSec's proxy tool of choice.
  5. 6. / There are two main types of cross-site scripting / Stored XSS and ______ XSS.
  6. 7. / A popular framework developed by Rapid7 used for internal network penetration testing.
  7. 8. / Make decisions. Make mistakes. Just take the initiative and orient to ______.
  8. 9. / The platform used for secure file storage.
  9. 12. / Our application penetration testing is closely aligned with the Application Security Verification Standard, created and maintained by this organization.
  10. 15. / In most organizations, the weakest link in security is the ______.