Cloud

3/12/2018
02:00 PM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Disappearing Act: Dark Reading Caption Contest Winners

A standout field with hysterical puns about security policies, Meltdown, Amazon Web Services, and the right to be forgotten. And the winner is ...

Joe Stanganelliprincipal at Beacon Hill Law in Boston, took top honors and a $25 Amazon gift card for his apt caption poking fun at AWS cloud services vulnerabilities. The caption is penned below by cartoonist John Klossner.

Joe faced stiff competition from our runners up: "About that Meltdown patch ..." by ianrod and "I told him not to print out the security policies ..." from DavidRandolph, both of whom will receive a $10 Amazon gift card.

Many thanks to everyone who entered the contest and to our loyal readers who cheered on the contestants. Also a shout-out to our judges, John Klossner and the Dark Reading editorial team: Tim Wilson, Kelly Jackson Higgins, Sara Peters, Kelly Sheriden, Curt Franklin, Jim Donahue, and yours truly. If you haven't had a chance to read all the entries, be sure to check them out today.

See more caption contest winners:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
dieumoayahoo
50%
50%
dieumoayahoo,
User Rank: Apprentice
10/15/2018 | 11:06:47 PM
Pending Review
This comment is waiting for review by our moderators.
jinumm
50%
50%
jinumm,
User Rank: Apprentice
6/3/2018 | 11:12:08 PM
Re: Thanks!
Thanks Teams, Kepp posting .....
rsantalesa
50%
50%
rsantalesa,
User Rank: Apprentice
3/13/2018 | 3:40:43 PM
Re: Thanks!
Nice! 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/12/2018 | 3:27:12 PM
Thanks!
Thanks, DR team (and John)!

> poking fun at AWS cloud services vulnerabilities

Shucks, you give me too much credit. I just liked the play on words/phrase. It was either that or "Azure".
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.
CVE-2018-18377
PUBLISHED: 2018-10-16
goform/setReset on Orange AirBox Y858_FL_01.16_04 devices allows attackers to reset a router to factory settings, which can be used to login using the default admin:admin credentials.
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.