Across
- 3. Tech world’s fire brigade—second shout
- 4. When the cloud gets graded for playing by the compliance rulebook.
- 6. VIOLATION Red ink on the corporate report card
- 7. Every journey’s pit stops
- 9. ESCALATION The elevator hack from novice to boss
- 12. IQ At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
- 16. POLICY Document on every website about rules for handling details
- 18. MODEL DNA test for who’s calling the shots
- 19. DATA Any data, direct or indirect, that reveals a person’s identity
- 20. When a hacker sneaks past your digital guard
Down
- 1. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
- 2. When your browser “remembers” you, for a while
- 5. Tekion’s legendary vault no hacker can touch.
- 8. SEGMENTATION Safety scissors for your network
- 10. Buzzing threat hunter hangout
- 11. GOVERNANCE Processes to ensure robots don’t go rogue
- 13. Slamming the panic room door on hackers
- 14. NOTICE Pop-up or email outlining changes in how data gets used
- 15. The organization behind the ATT&CK plots
- 17. Info swap: turn gold into poker chips
