Cloud

1/8/2018
02:00 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: C-Suite & Cybersecurity

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Manon.
50%
50%
Manon.,
User Rank: Apprentice
2/2/2018 | 2:13:24 AM
Not without a reason, Mr. X. I assure you.
Mr. X: I hereby present you a fail-safe security model, which failed to strike in the minds of our rapidly growing competitor!

Manager: Not without a reason, Mr. X. I assure you, it was not without a reason.
ebyjeeby
50%
50%
ebyjeeby,
User Rank: Strategist
1/25/2018 | 1:04:21 PM
caption
All the security that's in the budget!
ak25455
50%
50%
ak25455,
User Rank: Apprentice
1/23/2018 | 5:19:53 PM
Re: C-suite and Cybersecurity
..and to demonstrate separation of duties within our security department....
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
1/22/2018 | 10:22:06 PM
Centralization
I suspect that different approach will involve a six-armed guy doing all three motions -- lest any insight be observed accidentally!
Kristendean80
100%
0%
Kristendean80,
User Rank: Strategist
1/18/2018 | 11:52:23 AM
Re: C-Suite & Cybersecurity
Information Security is a top priority at this company. We've done a lot of stupid things we would like to keep secret.
cynrgy
67%
33%
cynrgy,
User Rank: Strategist
1/17/2018 | 3:47:34 PM
Re: C-Suite & Cybersecurity
We have adopted a three-pronged approach to pc security.  Thus far no one has seen, heard, or spoken of any problems relating to it so it must be affective.
sharrondhuga
50%
50%
sharrondhuga,
User Rank: Apprentice
1/17/2018 | 11:43:35 AM
amazing
amazing
cybersavior
50%
50%
cybersavior,
User Rank: Strategist
1/17/2018 | 8:45:46 AM
Rather....
Equifax's Simian Army
GWAIN
50%
50%
GWAIN,
User Rank: Strategist
1/16/2018 | 1:25:49 PM
Threat vs Risk
We have presented legacy and emerging threats.  Let me introduce you to how the business is dealing with the risk.
InfoSecurityMaster
50%
50%
InfoSecurityMaster,
User Rank: Strategist
1/16/2018 | 12:03:53 PM
Barrel of Monkeys
...so, any questions on how to brief The Board on information security?
Page 1 / 2   >   >>
How Cybercriminals Clean Their Dirty Money
Alexon Bell, Global Head of AML & Compliance, Quantexa,  1/22/2019
Facebook Shuts Hundreds of Russia-Linked Pages, Accounts for Disinformation
Sara Peters, Senior Editor at Dark Reading,  1/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's not that smart. He's running iOS 11 on a 5c."
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20742
PUBLISHED: 2019-01-24
An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. There is no boundary check on ocall_malloc. The return value could be a pointer to enclave memory. It could cause an arbitrary enclave memory write.
CVE-2019-6486
PUBLISHED: 2019-01-24
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
CVE-2018-17693
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the con...
CVE-2018-17694
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2018-17695
PUBLISHED: 2019-01-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...