If you're having difficulty finding answers, we know a good place to search for more clues...
1 something you have too many of (6)
[?]5 IoT security researcher Santamarta (5)
[?]8 technology that extends a private network across a public network (3)
[?]9 PoisonIvy, Dark Comet, or Blackshades (3)
10 thing you need to encrypt or sing well (3)
11 Mini, Cozy, Onion and Cosmic (5)
12 e-commerce attack that hit Macy's (8)
[?]17 place to outsource security tasks (4)
18 mobile phone social engineering attack (11)
[?]21 exploited in Equifax breach (12)
[?]23 network security tool that tries to stop infiltrators (3)
25 US government office that exposed millions of federal employees PII in 2015 (3)
[?]27 tool for stealing credit card numbers (7)
[?]28 popular place to put misconfigured, leaky cloud buckets (3)
[?]29 convert passwords to unreadable strings or a good way to prepare potatoes (4)
33 ransomware that took down the City of Atlanta (6)
[?]36 international interbank messaging system exploited in bank heists (5)
[?]37 retail company hit with record-setting breach (3)
[?]38 certification for pen testers (3)
1 healthcare insurer that exposed 78.8 million records in 2015 (6)
[?]2 ransomware known for long dwell time, human operators, that took down Tribune Publishing (4)
[?]3 entertainment company hit with massive IP theft and wiper in 2014 (4)
4 retailer that was compromised via a third party HVAC contractor and exposed 40M credit card numbers (6)
6 Microsoft RDP vulnerability that prompted out-of-band patches (8)
[?]7 office that set landmark cybersecurity policy for New York finance industry (5)
8 exploitable software bug, for short (4)
13 European privacy law (4)
14 common infosec certification (5)
15 kind of bounty (3)
16 something you have too many of (9)
[?]17 fastest-spreading virus of its time, in 1999 (7)
19 Austrian privacy activist (7)
[?]20 ransomworm that stormed the world in 2018 (8)
22 the worst kind of privileges to be exposed (5)
24 SMS attack (5)
26 a type of attack that intercepts communications (4)
30 sophisticated attack group, for short (3)
31 white, black, or gray item (3)
32 unlawful data exposure (3)
34 tool for finding malware, for short (2)
35 home base for security first responders (3)
1 something you have too many of (6)