Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity.

Across:
1. A secret set of characters used for authentication
3. Process of converting information into a code
7. October marks National Cybersecurity ___ Month
8. The core of what cybersecurity aims to protect
Down:
1. Deceptive attempt to obtain sensitive information
2. Software that demands payment from users
4. Program developed by criminals to cause harm
5. Deceptive emails often request this personal code
6. Advisable action for compromised login credentials
Read Next
The Role of Cybersecurity Information-Sharing Amid Geopolitical Tensions
Recent military actions have heightened geopolitical tensions and with that comes an elevated cyber threat landscape. In this context, one reality stands out: information-sharing is more important than ever.
Examining the White House’s National Cyber Strategy Webinar
A webinar that featured cyber experts who discussed the White House's latest National Cybersecurity Strategy.
Cybersecurity Coalition, Hacking Policy Council Comment on NIST Cyber AI Profile
The Cybersecurity Coalition and the Hacking Policy Council submitted comments to NIST in response to the initial public draft of the Cybersecurity Artificial Intelligence Community Profile.
