Across
- 3. Praetorian's secure messaging platform, developed in-house and used for communicating sensitive information to clients.
- 5. An encryption technique named after a well-known Roman politician.
- 7. The platform used for secure file storage.
- 8. Platform used for tracking goals and key results.
- 9. A sequence of words or text used instead of a password.
- 12. In the summer of 2015, interns at Praetorian build an IOT fingerprinting device out of a Raspberry Pi. The next step, naturally, was to attach the Pi to one of these.
- 14. One of Praetorian's core values is to default to ______.
- 16. In 2017, Praetorian hired our first ever Chief ______ Officer.
- 19. In most organizations, the weakest link in security is the ______.
- 20. The name of Praetorian's latest web-based platform, which offers security as a service.
Down
- 1. The machine in the breakroom that none of us could live without.
- 2. AppSec's proxy tool of choice.
- 4. The HipChat emoji that means it's time for lunch.
- 6. A popular framework developed by Rapid7 used for internal network penetration testing.
- 10. A popular password cracking tool.
- 11. With this popular office device, anyone in the office can be a DJ.
- 13. The Roman Senate and People.
- 15. There are two main types of cross-site scripting: Stored XSS and ______ XSS.
- 17. Our application penetration testing is closely aligned with the Application Security Verification Standard, created and maintained by this organization.
- 18. Make decisions. Make mistakes. Just take the initiative and orient to ______.
