Zero Trust, Full Confidence
White Hats & Wolf Tracks
The Pack Protects
SOC It to Me!
Howling at the Threats
100

This principle assumes no user or device is trustworthy by default, even inside the network perimeter.

What is Zero Trust?

100

These "hats" are worn by hackers who help organizations find and fix security flaws.

What are White Hat Hackers?

100

Arctic Wolf’s security teams are known by this name/acronym.

Concierge Security Team (CST)

100

SOC analysts use this type of software to collect and analyze security data from across the network.

What is a SIEM (Security Information and Event Management)?

100

This type of software is designed to damage or disrupt systems—examples include viruses and ransomware.

What is Malware?

200

This type of authentication requires more than just a password—like a code sent to your phone.

What is Multi-Factor Authentication (MFA)?

200

This type of test simulates a cyberattack to find vulnerabilities before bad actors do.

What is Penetration Testing?

200

Arctic Wolf helps companies monitor and respond to threats 24/7 using this type of center.

What is a Security Operations Center (SOC)

200

This role in the SOC (Security Operations Center) is responsible for investigating alerts and escalating serious threats.

What is a SOC Analyst?

200

This common vulnerability occurs when users choose weak or reused credentials.

What are Password Weaknesses?

300

This framework helps organizations manage who has access to what resources, based on roles.

What is Role-Based Access Control (RBAC)

300

This document is often created after a pen test to summarize findings and recommendations.

What is a Penetration Test Report?

300

Arctic Wolf’s team-based model helps reduce this common cybersecurity challenge. 

hint: handling these 24/7 sure is tiring 

What is Alert Fatigue 
300

This type of alert often signals suspicious activity that needs further investigation.

What is a Security Incident?

300

Arctic Wolf uses this type of intelligence to stay ahead of emerging cyber threats.

What is Threat Intelligence?

400

In Zero Trust, this is continuously monitored to detect unusual behavior and prevent breaches.

What is User Activity or User Behavior?

400

This process involves collecting and analyzing data from devices after a cyber incident.

What is Digital Forensics?

400

Arctic Wolf’s logo features this animal, symbolizing teamwork and vigilance.

What is a Wolf?

400

How many Security Engineers are currently working in the Arctic Wolf SOC?

What are 1000+ Engineers Globally

400

This type of attack tricks users into revealing sensitive information, often through fake emails.

What is Phishing?

500

This identity service verifies users before granting access to cloud applications.

What is Single Sign-On (SSO)

500

This digital trail can help investigators understand how a breach occurred.

What is a Log File or Audit Trail

500

Arctic Wolf’s mission is to end this widespread problem.

What is Cyber Risk?

500

An Arctic Wolf SOC engineer shares what job function with someone who works in the ER. 

What is Triage

500

Arctic Wolf helps organizations stay ahead of threats by analyzing this type of external data.

What is Threat Intelligence Feeds?