Name That Toon: It’s E-Live!

Share This Post

The Monster using a mobile device is certainly not the way Frankenstein author Mary Shelley — or evenYoung Frankenstein screenplay writers Mel Brooks and Gene Wilder — ever envisioned him. But modern times call for a modern creature, and now it’s up to you to set the updated scene with a clever cybersecurity-related caption. Our favorite will win a $25 Amazon gift card.

Here are four convenient ways to submit your ideas before the April 12, 2023, deadline:

Email [email protected] with the subject line “Dark Reading March Toon.”Via social media: Twitter, Facebook, and LinkedIn. (If you win, we’ll respond to you on the same platform, requesting your email address.)Last Month’s Winner

A round of applause goes to Todd Schamberger, information security manager/CISSP at accounting firm Miller Kaplan. Todd’s caption (below) hit the nail — er, computer — right on its head. And a big thanks to all who submitted their ideas!

Read More

Dark Reading

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.