Endpoint

10/20/2017
10:30 AM
John Klossner
John Klossner
Cartoon Contest

Cartoon: Security Talent Crisis

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Ratteau
50%
50%
Ratteau,
User Rank: Strategist
11/22/2017 | 10:28:00 AM
Caption
What do you know about unicorns?  The last guy couldn't get rid of one running around here for months.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
11/16/2017 | 3:52:58 PM
Overly critical in interview
Yeah, a lot of people understandably think that saying, "Yeah, I'm already seeing vulnerabilities; you guys need to do this and this," will just impress the interviewers; in reality, it ticks them off and makes them think the candidate is boorish.

But therein lies the problem of the job interview. People aren't interviewing to take a job doing job interviews. They're interviewing to do a job. Maybe being bad at a job interview -- to a certain extent -- can and should be forgiven if everything else looks good.
InfoSecurityMaster
100%
0%
InfoSecurityMaster,
User Rank: Strategist
11/13/2017 | 11:05:05 AM
Security Talent Crisis
Thanks for bringing a printed resume. Everytime I try to open the one on my computer, it keeps charging me bitcoin. 
InfoSecurityMaster
50%
50%
InfoSecurityMaster,
User Rank: Strategist
11/13/2017 | 10:55:40 AM
Security Hiring Crisis
I don't know much about security - do your CISSP, CAP, CISM & CRISC certifications qualify you to scan for antivirus?
syntax_attack
50%
50%
syntax_attack,
User Rank: Strategist
11/7/2017 | 12:45:08 PM
Re: Cartoon
I see you have a Masters in music composition, you're hired!
North2AK
50%
50%
North2AK,
User Rank: Strategist
11/2/2017 | 8:51:06 PM
Re: Cartoon
Better caption for this cartoon:

 

So...you're previously from Equifax cyber security...?
jdbrazelton
50%
50%
jdbrazelton,
User Rank: Apprentice
10/30/2017 | 2:49:44 PM
Cartoon
He came in dressed as the Grim Reaper as if it was Halloween.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/30/2017 | 10:49:41 AM
Check out our New Cartoon....
So True!
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8030
PUBLISHED: 2018-06-20
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 a...
CVE-2018-1117
PUBLISHED: 2018-06-20
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this cou...
CVE-2018-11701
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x005cb509, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11702
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00578cb3, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11703
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00402d6a, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.