asdf

1234567891011121314151617181920
Across
  1. 3. Praetorian's secure messaging platform, developed in-house and used for communicating sensitive information to clients.
  2. 5. An encryption technique named after a well-known Roman politician.
  3. 7. The platform used for secure file storage.
  4. 8. Platform used for tracking goals and key results.
  5. 9. A sequence of words or text used instead of a password.
  6. 12. In the summer of 2015, interns at Praetorian build an IOT fingerprinting device out of a Raspberry Pi. The next step, naturally, was to attach the Pi to one of these.
  7. 14. One of Praetorian's core values is to default to ______.
  8. 16. In 2017, Praetorian hired our first ever Chief ______ Officer.
  9. 19. In most organizations, the weakest link in security is the ______.
  10. 20. The name of Praetorian's latest web-based platform, which offers security as a service.
Down
  1. 1. The machine in the breakroom that none of us could live without.
  2. 2. AppSec's proxy tool of choice.
  3. 4. The HipChat emoji that means it's time for lunch.
  4. 6. A popular framework developed by Rapid7 used for internal network penetration testing.
  5. 10. A popular password cracking tool.
  6. 11. With this popular office device, anyone in the office can be a DJ.
  7. 13. The Roman Senate and People.
  8. 15. There are two main types of cross-site scripting: Stored XSS and ______ XSS.
  9. 17. Our application penetration testing is closely aligned with the Application Security Verification Standard, created and maintained by this organization.
  10. 18. Make decisions. Make mistakes. Just take the initiative and orient to ______.