![The Edge Logo The Edge Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
Contest: Name That Toon
Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. The contest ends August 8. If you don't want to enter ...
July 1, 2019
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2f1cde5edd81b1d3/64f0d0cda84e75f7019430f8/toon_070819.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. The contest ends August 8. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. Editorial comments are encouraged and welcomed.
Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024