
Across:
1. Time for a digital refresh! Do this to your software to keep everything running smoothly.
3. This phishing-resistant authentication method protects accounts without having to remember a password.
5. Dust-busting for your hard drive.
7. Clear out these little crumbs websites leave behind after you visit, just like wiping down counters.
8. Marie Kondo-ing of programs that no longer spark joy.
Down:
2. Do a spring cleaning of your inbox to avoid these “fool” emails that try to hook your data.
4. Sweep away harmful software with security tools, just like vacuuming up dirt and debris from every corner of your digital space.
6. Like dust bunnies hiding under the couch, these are unwanted programs that can slow down your system’s performance.
Read Next
Decrypt the Grid
Challenge yourself with this puzzle designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology.
DNS Security in Focus: RSA Conference 2025
The Center hosted a roundtable to exam how protective DNS, DNSSEC, and encrypted transports can be scaled across government and industry, aligning with different cybersecurity frameworks.
Aligning AI and Cybersecurity: Takeaways from a Discussion on the UK’s New AI Cyber Security Code of Practice
In a workshop hosted by the Center for Cybersecurity Policy & Law and Alliance for Trust in AI (ATAI), stakeholders from government, academia, and industry gathered to discuss the UK’s new AI Cyber Security Code of Practice.