Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/27/2020
10:00 AM
Dark Reading
Dark Reading
Cartoon Contest
50%
50%

Name That Toon: Remote Work in the Era of Coronavirus

 

Submit your caption in the comments and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winning caption by voting on the submissions. Click thumbs-up for those you find funny; thumbs-down, not so. As always, editorial comments are encouraged and welcomed. Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes April 24. 

Related Content

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
annaks
100%
0%
annaks,
User Rank: Apprentice
4/16/2020 | 12:40:07 PM
Name That Toon: Remote Work in the Era of Coronavirus
He went viral - I had to do it!
JamesS94103
50%
50%
JamesS94103,
User Rank: Strategist
4/14/2020 | 1:43:40 PM
Re: Contest
Hello 911, I'd like to report a Youtuber trying to infect me with the Corona.
TonyMPE1
50%
50%
TonyMPE1,
User Rank: Apprentice
4/14/2020 | 6:20:37 AM
Name That Toon: Remote Work in the Era of Coronavirus
I'll have to call you back, I'm on a Zoom video call with Dave... but don't worry, I've taken extra precautions.
Teckigrl
100%
0%
Teckigrl,
User Rank: Apprentice
4/10/2020 | 6:10:57 AM
Name that toon
Yes, I do have virus protection on my system, now what?
lmsaeb
0%
100%
lmsaeb,
User Rank: Apprentice
4/9/2020 | 6:20:58 PM
"Hello, Tech Support. I think my computer has a virus"
"Hello, Tech Support. I think my computer has a virus"
jenkins8661
0%
100%
jenkins8661,
User Rank: Apprentice
4/9/2020 | 11:42:54 AM
Caption
Digitized COVID-19 Prevention
MagneticPortal
50%
50%
MagneticPortal,
User Rank: Apprentice
4/9/2020 | 2:22:03 AM
Caption suggestion
The dead do not laugh...
sqm01
100%
0%
sqm01,
User Rank: Apprentice
4/8/2020 | 11:10:13 AM
Name That Toon: Remote Work in the Era of Coronavirus
What, Client side filtering won't work?
ANON1242361791934
50%
50%
ANON1242361791934,
User Rank: Apprentice
4/3/2020 | 12:23:44 PM
Cartoon Response
Hello...Nurse...I've placed a mask on him but he refuses to wear gloves...now what?
acampbell448
0%
100%
acampbell448,
User Rank: Strategist
4/1/2020 | 10:34:43 AM
Security?
I read to new remote worker security policy and have it covered!
Page 1 / 2   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4177
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174732.
CVE-2020-4180
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 174735.
CVE-2020-4182
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174738.
CVE-2020-4187
PUBLISHED: 2020-06-03
IBM Security Guardium 11.1 could disclose sensitive information on the login page that could aid in further attacks against the system. IBM X-Force ID: 174805.
CVE-2020-4190
PUBLISHED: 2020-06-03
IBM Security Guardium 10.6, 11.0, and 11.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174851.