General
Awareness
Security in
Pop Culture
Security
@ Vanta
Web
Vulns
Vanta
Product
100

In this form of cybersecurity attack, the weak link isn’t the software - it’s the people

What is social engineering?

100

In this 1999 sci-fi film, a character learns that what he thought was reality is actually a virtual construct created by machines

What is the Matrix?

100

This email address is how you report phishing emails!

What is phishing@vanta.com?

100

Though it sounds like the next installment of a movie, this type of cyber attack involves inserting malicious code into a database query to manipulate or access data…

What is a SQL injection?

100

This Vanta offering means you get an MDM-lite solution to help monitor your endpoints

What is Vanta Agent?

200

This security approach involves “double-checking” your identity with two or more verification factors

What is MFA?

200

In this TV series, a cybersecurity engineer by day and a vigilante hacker by night takes down corporations with his adversarial skillset

What is Mr. Robot?

200

This standard specifies the requirements for establishing, implementing, maintaining, and improving an Artificial Intelligence Management System - Vanta just completed its Stage 2!

What is ISO 42001?

200

This vulnerability sounds like you’re competing in a “race” but in reality, it allows attackers to gain a shell on your server

What is Remote Code Execution (RCE)?

200

Want to learn more about Vanta’s own internal compliance and security? Navigate to this, where we even have an AI chatbot

What is Trust Center?

300

This principle keeps your systems secure by giving users the smallest set of permissions they need - and nothing more

What is least privilege?  

300

In this cyber-focused novel and film series, hacking isn’t just a hobby for the protagonist—it’s her weapon against powerful enemies

What is the Girl with the Dragon Tattoo?  

300

This non-profit organization offers a common security framework (CSF) and assessments for organizations. Vanta became their first pre-built solution compliance partner

What is HITRUST?

300

It may look like a typo for “XLS”, in this type of vulnerability, an attacker tricks a website into delivering harmful scripts to users, often leading to stolen cookies or session data

What is Cross Site Scripting (XSS)?

300

Have you done your Vanta training yet? This is how often you will receive automatic notifications until you complete it (and of course, Alex or Kat may have already reached out directly)

What is daily?

400

This process ensures data is unreadable - except to those with the right “key”

What is encryption?

400

This 1995 film follows a group of teenagers who uncover a conspiracy while exploring the world of computer hacking. These 1337 hackers manage to pwn a Gibson supercomputer in order to stop a virus from capsizing oil tankers

What is Hackers?

400

This is the go/ link you should use to report non-urgent security or privacy risks

What is go/report?

400

This vulnerability sounds like the entrance to an Apple store but in web security, it’s a vulnerability where websites fail to properly restrict what resources or files users can access

What is insecure direct object reference (IDOR)?

400

This chrome extension ensures that you can answer your company’s security questions with the click of a button

What is Questionnaire Automation (Q-Auto)?

500

This method of concealing data is useful if you need to hide information in plain sight

What is steganography?

500

This anthology series explores the dark side of technology, from hacking to dystopian digital futures. It even includes an episode where a hacker uses malware to blackmail victims into performing increasingly illegal and dangerous actions

What is Black Mirror?

500

On October 11, the Department of Defense released the “Final Program Rule” to formalize the requirements/assessment, and related governance of THIS. (Hint: Matt Cooper talked about it at the last 6 minutes of security)

What is Cyber Maturity Model Certification Program (CMMC)?

500

This vulnerability sounds like you’re good at riding ocean waves but in reality, it tricks a server into making unauthorized requests

What is Server-Side Request Forgery (SSRF)?

500

Vanta customers have the option to store their data in these three regions

What is North America, the EU, and (new!) Australia?

M
e
n
u