Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

End of Bibblio RCM includes -->
11/19/2020
07:00 AM
John Klossner
John Klossner
Cartoon Contest

Cartoon Contest: Gong Show

Submit your caption in the comments and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winning caption by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. As always, editorial comments are encouraged and welcomed. Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes Dec. 23. 

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
mmillslagel85001
mmillslagel85001,
User Rank: Guru
12/22/2020 | 9:57:39 AM
Cartoon contest
Couldn't we have just gotten a bell to ring when we do a good job?
Ace2010
Ace2010,
User Rank: Strategist
12/21/2020 | 12:00:05 PM
Going all Gong
Jeff needs to have his hearing checked...When the manager said our KPIs are heading in the "wrong" direction, Jeff thought she said "gong" and was excited to bring his into the office.
kratiw
kratiw,
User Rank: Strategist
12/21/2020 | 9:43:16 AM
The latest drama story in IT ...
Gong with SolarWinds

Too soon?

 
Ace2010
Ace2010,
User Rank: Strategist
12/18/2020 | 4:17:01 PM
Quality Assurance
Instead of hiring a full QA team to test our code, they hired Steve who can spot a defect a mile away. So, if you hear the gong, you'll know why!
Ace2010
Ace2010,
User Rank: Strategist
12/18/2020 | 4:13:37 PM
Social Distancing
This was management's solution to ensuring social distancing...So, if you get too close, it's Fred's job to let you know!
Ace2010
Ace2010,
User Rank: Strategist
12/18/2020 | 3:33:27 PM
Code Review
Before he did code review, he toured with Queen as the gong player for Bohemian Rhapsody!
Ace2010
Ace2010,
User Rank: Strategist
12/18/2020 | 3:29:32 PM
More Cowbell
While I love the gong, what we really need around here is "more cowbell"
dianeabbott
dianeabbott,
User Rank: Apprentice
12/17/2020 | 12:03:34 PM
Secure Code Review
He takes the secure code review VERY seriously.
dannoman
dannoman,
User Rank: Strategist
12/17/2020 | 6:12:24 AM
Oh, the gong?
"What's with the gong?" "Oh him? He doesn't do actual work, he just critiques others. When you have a flaw, 'GONG!'"
NU-Cengel
NU-Cengel,
User Rank: Apprentice
12/15/2020 | 5:04:24 PM
Caption: I don't know why this fixes the server problem....it just does.
Caption: I don't know why this fixes the server problem....it just does.
Page 1 / 3   >   >>
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4252
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2013-4561
PUBLISHED: 2022-06-30
In a openshift node, there is a cron job to update mcollective facts that mishandles a temporary file. This may lead to loss of confidentiality and integrity.
CVE-2022-2197
PUBLISHED: 2022-06-30
By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations.
CVE-2022-28127
PUBLISHED: 2022-06-30
A data removal vulnerability exists in the web_server /action/remove/ API functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary file deletion. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2022-32585
PUBLISHED: 2022-06-30
A command execution vulnerability exists in the clish art2 functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.