Across
- 3. Biggest liability
- 5. Discussion based exercise to prepare for emergency situation
- 7. Beyond the endpoint
- 8. Command and control
- 12. Famous hacking group
- 16. Pipeline breach 2021
- 17. Backup operational mode in networking
- 18. Exchange data packets
- 21. Palo Alto central management system
- 22. Crowdstrike competitor to Port53
- 24. NIST
- 25. Secret code
- 27. Founder of OpenDNS
- 28. Records keystrokes
- 32. Where you place Orginfo for Secure Client on Windows
- 34. Disguising a communication from an unknown source as being from a known, trusted source
Down
- 1. Tax evasion; Antivirus
- 2. A way to enter the system
- 4. Log4j
- 6. Secure Endpoint advanced threat hunting tool
- 9. Looks innocent
- 10. Single tool
- 11. Trial and error on login
- 13. Sequence of instructions in programming
- 14. Port 53
- 15. Stronger than a password
- 19. A point of intersection within a data communication network
- 20. Secure Email domain protection
- 23. Old network technology to route traffic when most reources were on premise
- 26. App that lets you communicate with the Mac operating system using a command line interface
- 29. Delay in resolution
- 30. Virtual geographic boundary
- 31. Analysis of cyber risks
- 33. Power over Ethernet
