Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/19/2018
11:00 AM
Dark Reading
Dark Reading
Cartoon Contest
67%
33%

Name That Toon: I Spy

We provide the cartoon. You write the caption!
We provide the cartoon. You write the caption!

 
Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes December 15.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 8   >   >>
aarrowood
50%
50%
aarrowood,
User Rank: Strategist
12/11/2018 | 2:09:01 PM
caption
Huh, looks like someone took my "but who's going to watch the watchers?!?" comment too far...
BigDrD
0%
100%
BigDrD,
User Rank: Guru
12/11/2018 | 2:45:59 AM
New camera 2FA closed loop!
New camera 2FA closed loop!
drypaint
50%
50%
drypaint,
User Rank: Apprentice
12/11/2018 | 12:30:15 AM
Cam07
CAM07: "CAM09, do you ever feel paranoid? Like someone is watching everything you do?"

CAM09: "Sometimes CAM07, but then I remind myself that I really don't do anything worth watching."
NordicNorm
67%
33%
NordicNorm,
User Rank: Apprentice
12/7/2018 | 8:18:41 AM
Cartoon Contest
I guess this answers the question: who's watching the watchers?
jkeller_lluh
50%
50%
jkeller_lluh,
User Rank: Apprentice
12/6/2018 | 3:54:32 PM
Zero Trust
Looks like security's Zero Trust implementation needs some refinement.
PanamaVet
0%
100%
PanamaVet,
User Rank: Strategist
12/6/2018 | 10:00:09 AM
True
Mueller used the one on the left for probable cause and the other for backup.
FKREITZBERG980
50%
50%
FKREITZBERG980,
User Rank: Moderator
12/5/2018 | 3:01:54 PM
Camers
I see building security and corporate security are still not getting along.
FMB3
50%
50%
FMB3,
User Rank: Apprentice
12/5/2018 | 2:05:01 PM
Trust no one
This is what happens when you have a red and blue security teams
They don't trust anyone....including each other!
kpoeling
50%
50%
kpoeling,
User Rank: Apprentice
12/5/2018 | 9:56:39 AM
It's a test!
Let's see how many people we can get to click on this picture as if it was a phishing email... so far security isn't looking too good.
PanamaVet
50%
50%
PanamaVet,
User Rank: Strategist
12/5/2018 | 8:46:27 AM
BS in Photography
Is the bio for the new CSO online?
<<   <   Page 2 / 8   >   >>
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0258
PUBLISHED: 2020-02-17
Multiple incomplete blacklist vulnerabilities in the avatar upload functionality in manageuser.php in Collabtive before 2.1 allow remote authenticated users to execute arbitrary code by uploading a file with a (1) .php3, (2) .php4, (3) .php5, or (4) .phtml extension.
CVE-2015-6922
PUBLISHED: 2020-02-17
Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setA...
CVE-2020-9043
PUBLISHED: 2020-02-17
The wpCentral plugin before 1.5.1 for WordPress allows disclosure of the connection key.
CVE-2020-1704
PUBLISHED: 2020-02-17
An insecure modification vulnerability in the /etc/passwd file was found in all versions of OpenShift ServiceMesh (maistra) before 1.0.8 in the openshift/istio-kialia-rhel7-operator-container. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privi...
CVE-2019-12954
PUBLISHED: 2020-02-17
SolarWinds Network Performance Monitor (Orion Platform 2018, NPM 12.3, NetPath 1.1.3) allows XSS by authenticated users via a crafted onerror attribute of a VIDEO element in an action for an ALERT.