Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity.

Across:
1. A secret set of characters used for authentication
3. Process of converting information into a code
7. October marks National Cybersecurity ___ Month
8. The core of what cybersecurity aims to protect
Down:
1. Deceptive attempt to obtain sensitive information
2. Software that demands payment from users
4. Program developed by criminals to cause harm
5. Deceptive emails often request this personal code
6. Advisable action for compromised login credentials
Read Next
Cybersecurity Awareness Month Series: CISA 2015
October is Cybersecurity Awareness Month, and we’re launching an educational one-pager series spotlighting the policies and frameworks that shape our collective defense.
CyberNext DC 2025 Recap
The Cybersecurity Coalition and the Cyber Threat Alliance hosted the 9th annual CyberNext DC, convening innovators, policymakers, and security experts to explore the pressing challenges and innovative responses shaping the cybersecurity space.
Shoring Up Subsea Security: A Comprehensive Action Plan to Promote Submarine Cable Resiliency, Security, & Governance
Submarine cables are the essential infrastructure enabling the global economy. This paper recommends enhancing the resilience of the ecosystem through greater route diversity and redundancy, rapid repair capacity, and secure supply chain.