Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

3/12/2018
02:00 PM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Disappearing Act: Dark Reading Caption Contest Winners

A standout field with hysterical puns about security policies, Meltdown, Amazon Web Services, and the right to be forgotten. And the winner is ...

Joe Stanganelliprincipal at Beacon Hill Law in Boston, took top honors and a $25 Amazon gift card for his apt caption poking fun at AWS cloud services vulnerabilities. The caption is penned below by cartoonist John Klossner.

Joe faced stiff competition from our runners up: "About that Meltdown patch ..." by ianrod and "I told him not to print out the security policies ..." from DavidRandolph, both of whom will receive a $10 Amazon gift card.

Many thanks to everyone who entered the contest and to our loyal readers who cheered on the contestants. Also a shout-out to our judges, John Klossner and the Dark Reading editorial team: Tim Wilson, Kelly Jackson Higgins, Sara Peters, Kelly Sheriden, Curt Franklin, Jim Donahue, and yours truly. If you haven't had a chance to read all the entries, be sure to check them out today.

See more caption contest winners:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
dieumoayahoo
50%
50%
dieumoayahoo,
User Rank: Apprentice
10/15/2018 | 11:06:47 PM
Re: Thanks!
the post is good, right?
jinumm
50%
50%
jinumm,
User Rank: Apprentice
6/3/2018 | 11:12:08 PM
Re: Thanks!
Thanks Teams, Kepp posting .....
rsantalesa
50%
50%
rsantalesa,
User Rank: Apprentice
3/13/2018 | 3:40:43 PM
Re: Thanks!
Nice! 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/12/2018 | 3:27:12 PM
Thanks!
Thanks, DR team (and John)!

> poking fun at AWS cloud services vulnerabilities

Shucks, you give me too much credit. I just liked the play on words/phrase. It was either that or "Azure".
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-0404
PUBLISHED: 2019-12-11
SAP Enable Now, before version 1911, leaks information about network configuration in the server error messages, leading to Information Disclosure.
CVE-2019-0405
PUBLISHED: 2019-12-11
SAP Enable Now, before version 1911, leaks information about the existence of a particular user which can be used to construct a list of users, leading to a user enumeration vulnerability and Information Disclosure.
CVE-2019-0395
PUBLISHED: 2019-12-11
SAP BusinessObjects Business Intelligence Platform (Fiori BI Launchpad), before version 4.2, allows execution of JavaScript in a text module in Fiori BI Launchpad, leading to Stored Cross Site Scripting vulnerability.
CVE-2019-0398
PUBLISHED: 2019-12-11
Due to insufficient CSRF protection, SAP BusinessObjects Business Intelligence Platform (Monitoring Application), before versions 4.1, 4.2 and 4.3, may lead to an authenticated user to send unintended request to the web server, leading to Cross Site Request Forgery.
CVE-2019-0399
PUBLISHED: 2019-12-11
SAP Portfolio and Project Management, before versions S4CORE 102, 103, EPPM 100 and CPRXRPM 500_702, 600_740, 610_740; unintentionally allows a user to discover accounting information of the Projects in Project dashboard, leading to Information Disclosure.