This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability.
White Hat
MS product line aimed to strengthen device security and enable seamless hybrid work experiences with a collection of endpoint management products.
Microsoft Intune
This popular cult classic received criticism from cybersecurity experts for its unrealistic portrayal of hacking techniques, including flying through a file system
Hackers (1995)
These two casino companies that were hit with a major cyberattack, after IT help desks were social engineered to obtain password resets and MFA bypass codes.
MGM and Ceasars
This early web browser had the coolest animated loading icon.
Netscape Navigator
A website with a site certificate is one that uses encryption; this letter after http is one sign of it
S
Tool that assesses your security posture and identify potential improvements across all your Microsoft 365 workloads with centralized visibility
Microsoft Secure Score
What is the name of the hacking group in the show Mr. Robot?
fsociety
Troy Hunt
Before Reddit, this site (cofounded by Kevin Rose) aggregated news and trending stories around the internet, allowing users to "Upvote" popular stories
Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this.
Bring Your Own Device
Windows feature that automatically manages and backs up the password of a local administrator account on your Microsoft Entra joined or Windows Server Active Directory-joined devices.
LAPS - Local Administrator Password Solution
The brand of phone did Neo use when talking to Morpheus
Nokia
Recently banned in Canada, this hacker tool can receive, read, store and transmit wireless signals to do things like controlling displays, open Tesla ports, and open garages.
Flipper Zero
Internet Relay Chat
A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them.
Bitcoins
Microsoft's Zero Trust Network Access (ZTNA) solution that connects users to private apps from any device and any network. It reduces the risk and cost of legacy VPNs, enforces adaptive access controls, and enhances security across hybrid and multicloud environments.
Microsoft Entra Private Access
The game that Matthew Broderick's character answered to this question?
Global Thermonuclear War
British Consulting firm that collected personal data of millions on Facebook, predominantly used for targeted political advertising
Cambridge Analytica
Default editor that comes with the UNIX operating system that the CLI pros would use over emacs and pico
vi
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.
Keylogging
The comprehensive set of solutions that can help your organization govern, protect, and manage data. Such as DLP, Privileged Access Management, eDiscovery, among others.
Microsoft Purview
Music group duo that scored the music for and made an appearance in, for the 2010 release of Tron: Legacy.
Daft Punk
This Crowdstrike CEO and Founder has had to apologize for what has been called the largest IT outage in history, caused by a faulty configuration update.
George Kurtz
The first video ever uploaded to YouTube, currently with 330M views, featured this world famous location.
The San Diego Zoo