Risk

9/11/2018
02:30 PM
John Klossner
John Klossner
Cartoon Contest

Name that Toon: Risky Business

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 10 / 10
JoeMetzger
0%
100%
JoeMetzger,
User Rank: Apprentice
9/13/2018 | 12:03:06 PM
Put your thinking cap on! We have new cartoon caption contest!
Chuck says "All this time I thought they were saying fishing ..."
KCondit
67%
33%
KCondit,
User Rank: Strategist
9/13/2018 | 11:41:31 AM
Re: Put your thinking cap on! We have new cartoon caption contest!
Well, I guess the problem wasn't between his chair and his keyboard after all.
dj_droo
0%
100%
dj_droo,
User Rank: Apprentice
9/13/2018 | 10:29:16 AM
The Hanging Desk
The trend in desk positions has reached it's final stage; from sitting, to standing, now to hanging.
wfishburne
67%
33%
wfishburne,
User Rank: Strategist
9/12/2018 | 4:25:17 PM
Caption
Paul wasn't kidding when he said he wanted agile developers.
jrig1842
0%
100%
jrig1842,
User Rank: Strategist
9/12/2018 | 2:58:14 PM
Management Material
Donald was never a very grounded individual, but he is certainly a high-flyer!
waltonob
50%
50%
waltonob,
User Rank: Strategist
9/12/2018 | 1:04:39 PM
MFA Level 10
And you thought it was dumb when Security added "Something you can do" as an authentication factor.
itgrrl
40%
60%
itgrrl,
User Rank: Apprentice
9/12/2018 | 2:41:24 AM
Re: Put your thinking cap on! We have new cartoon caption contest!
"Interns at the White House trial their latest Presidential tweet management plan."
Mikegyvr
33%
67%
Mikegyvr,
User Rank: Apprentice
9/11/2018 | 6:08:58 PM
Re: Put your thinking cap on! We have new cartoon caption contest!
Always the innovator, Ed demonstrated his take on the stand-up desk.
MatthewN117
60%
40%
MatthewN117,
User Rank: Apprentice
9/11/2018 | 5:08:38 PM
Re: Put your thinking cap on! We have new cartoon caption contest!
"Our information security department recently implemented keyboard airgaps for repeat offenders."
Marilyn Cohodas
0%
100%
Marilyn Cohodas,
User Rank: Strategist
9/11/2018 | 2:35:49 PM
Put your thinking cap on! We have new cartoon caption contest!
Winner gets a $25 Amazon gift card! 
<<   <   Page 10 / 10
RIP, 'IT Security'
Kevin Kurzawa, Senior Information Security Auditor,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17906
PUBLISHED: 2018-11-19
Philips iSite and IntelliSpace PACS, iSite PACS, all versions, and IntelliSpace PACS, all versions. Default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.
CVE-2018-9209
PUBLISHED: 2018-11-19
Unauthenticated arbitrary file upload vulnerability in FineUploader php-traditional-server &lt;= v1.2.2
CVE-2018-9207
PUBLISHED: 2018-11-19
Arbitrary file upload in jQuery Upload File &lt;= 4.0.2
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...