Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity.

Across:
1. A secret set of characters used for authentication
3. Process of converting information into a code
7. October marks National Cybersecurity ___ Month
8. The core of what cybersecurity aims to protect
Down:
1. Deceptive attempt to obtain sensitive information
2. Software that demands payment from users
4. Program developed by criminals to cause harm
5. Deceptive emails often request this personal code
6. Advisable action for compromised login credentials
Read Next
Special Episode: A Look at Cyber Policy in 2026 (DCP S2 E12)
For our second special episode of the Distilling Cyber Policy podcast, Alex and Jen from the Center are joined by experts to try and predict the future of cyber policy in the coming year, while reflecting on some of their previous prediction.
Offensive Cyber Operations with Stacy O’Mara and Leonard Bailey (DCP S2 11)
Offensive cyber activity has become a central policy conversation as governments worldwide rethink what tools are necessary to counter increasingly sophisticated threats.
2025 Year in Review: Advancing Cybersecurity Through Collaboration
In 2025, the cybersecurity ecosystem became more complex and we’ve seen governments rethink critical policy frameworks. Nonetheless, the Center has remained steadfast in strengthening cybersecurity through policy, collaboration, and education.
