Across
- 5. (10 letters) Security certifications help ensure that a product complies with important ________ standards and guidelines.
- 6. (5 letters) This vulnerability management solution automates the process of prioritizing and addressing security risks in Cisco products
- 7. (4 letters) A document that lists all the components and dependencies in a software product, helping to manage vulnerabilities
Down
- 1. (7 letters) This detection engine is commonly paired with Falco to manage security policies and controls in containerized environments.
- 2. (5 letters) The general term for security policies and frameworks used to monitor and address risks in cloud applications.
- 3. (7 letters) This open-source engine is used for detecting anomalies and security threats in containerized environments
- 4. (5 letters) A modern protocol used for securing network telemetry with real-time streaming, often used in telemetry dial-out
- 7. (5 letters) AI-based method used to identify and block unauthorized access attempts or attacks
