Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity.
![](https://cdn.prod.website-files.com/660ab0cd271a25abeb800460/674df25d8ec5131e086d9307_674df1d12dd3d3090f4ead76_Week%25201.png)
Across:
1. A secret set of characters used for authentication
3. Process of converting information into a code
7. October marks National Cybersecurity ___ Month
8. The core of what cybersecurity aims to protect
Down:
1. Deceptive attempt to obtain sensitive information
2. Software that demands payment from users
4. Program developed by criminals to cause harm
5. Deceptive emails often request this personal code
6. Advisable action for compromised login credentials
Read Next
Groundhogs Day All Over Again: UK Wants Encryption Backdoor for Apple Users
A year ago we published a report on global encryption policy, making the joke that it’s like the movie Groundhog Day: the same conversations, debates, and bad ideas just keep coming up. Well, it’s February, and we have another one.
Will Trump Uphold Biden’s Cybersecurity Order? Key AI and Vulnerability Management Provisions at Stake
In a decisive move during the final days of his administration, President Biden signed and released a cybersecurity EO marking a significant effort to address the evolving threat landscape particularly in the face of rising foreign adversaries.
Decrypt the Grid: CyberNext
Did you attend CyberNext DC 2024? Test your knowledge on all things CyberNext.