Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity. 

Across:

1. A secret set of characters used for authentication

3. Process of converting information into a code

7. October marks National Cybersecurity ___ Month

8. The core of what cybersecurity aims to protect

Down:

1. Deceptive attempt to obtain sensitive information

2. Software that demands payment from users

4. Program developed by criminals to cause harm

5. Deceptive emails often request this personal code

6. Advisable action for compromised login credentials

Read Next

Center’s New Amicus Brief in Epic v. Google: Competition Should Not Come at the Expense of Cybersecurity

In too many competition cases, cybersecurity has become an afterthought - the Center is seeking to halt this trend filing a series of amicus briefs seeking to educate the courts about core security consideration to correct lower-court overreach.

AI Governance in Latin America

Artificial intelligence is no longer a technology of the future, it is already transforming how societies function. But these tools need some level of oversight and this is explored in the latest white paper from the Digi Americas Alliance.