Friday, February 3, 2023
  • What are Software Audits and Why are They on the Rise?
  • Businesses Bolster Defenses as Data Breach Concerns Grow
  • Manipulating Weights in Face-Recognition AI Systems
  • Top Web Application Security Testing Companies
  • ChatGPT and API Security

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Humor Security Bloggers Network 

Home » Cybersecurity » Humor » XKCD, Interaction

SBN

XKCD, Interaction

by Marc Handelman on March 1, 2018

Permalink

TechStrong Con 2023Sponsorships Available

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://xkcd.com/1961/

March 1, 2018March 1, 2018 Marc Handelman Sarcasm, satire, security bloggers network, XKCD
  • ← Complying with NIST Guidelines for Stolen Passwords
  • My Top 7 Popular Gartner Blog Posts for Feburary 2018 →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

More Humor

‘Finish Him!’ US Kills Huawei With Final Tech Ban
AI and Machine Learning in Security AI and ML in Security Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Industry Spotlight IOT IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Regulatory Compliance Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Finish Him!’ US Kills Huawei With Final Tech Ban

February 1, 2023 Richi Jennings | 1 day ago 0
Humor Security Bloggers Network 

Randall Munroe’s XKCD ‘K-Means Clustering’

February 1, 2023 Marc Handelman | 1 day ago 0
Humor Security Bloggers Network 

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 417’

January 31, 2023 Marc Handelman | 2 days ago 0
Another Password Manager Leak Bug: But KeePass Denies CVE
Analytics & Intelligence API Security Application Security Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Malware Most Read This Week News Popular Post Securing Open Source Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Another Password Manager Leak Bug: But KeePass Denies CVE

January 31, 2023 Richi Jennings | 3 days ago 0

Most Read on the Boulevard

Another Password Manager Leak Bug: But KeePass Denies CVE
‘Finish Him!’ US Kills Huawei With Final Tech Ban
Security, Compliance Risks Complicate Cloud Migration Efforts 
QKD: The Key to a Resilient Future
Why Traditional Approaches Don’t Work for API Security
Six reasons why FedRAMP® matters to more than just the Feds
What is Red Teaming?
Sectigo Announces Further Advancements to Industry-Leading CLM Platform
ChatGPT Makes Waves Inside and Outside of the Tech Industry
Illicit Telegram Groups: A New Dark Web Frontier?

Upcoming Webinars

Mon 13

AI in Machine Learning

February 13 @ 1:00 pm - 2:00 pm
Wed 15

Understanding Cyber Insurance Identity Security Requirements for 2023

February 15 @ 11:00 am - 12:00 pm
Wed 15

Where Will DevSecOps ‘Shift’ Next?

February 15 @ 1:00 pm - 2:00 pm
Tue 21

Headwinds, Crosswinds and Tailwinds: Securing the Cloud in Turbulent Times

February 21 @ 1:00 pm - 2:00 pm
Wed 22

Best Practices to Secure Your Software Supply Chain

February 22 @ 1:00 pm - 2:00 pm
Tue 28

SaaS-Based Container Networking and Security on Amazon EKS

February 28 @ 11:00 am - 12:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Industry Spotlight

US No-Fly List Leaked via Airline Dev Server by @_nyancrimew
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

US No-Fly List Leaked via Airline Dev Server by @_nyancrimew

January 23, 2023 Richi Jennings | Jan 23 0
T-Mobile’s SIXTH Breach in 5 years: 37M Users’ PII Leaks
Analytics & Intelligence API Security Careers Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

T-Mobile’s SIXTH Breach in 5 years: 37M Users’ PII Leaks

January 20, 2023 Richi Jennings | Jan 20 0
APIs in Vehicle Software Vulnerable to Attacks
API Security Application Security Cybersecurity Data Security Featured Industry Spotlight Malware Security Boulevard (Original) Threat Intelligence Vulnerabilities 

APIs in Vehicle Software Vulnerable to Attacks

January 18, 2023 Sue Poremba | Jan 18 0

Top Stories

Businesses Bolster Defenses as Data Breach Concerns Grow
Cybersecurity Data Security Featured Incident Response News Security Boulevard (Original) Threat Intelligence 

Businesses Bolster Defenses as Data Breach Concerns Grow

February 3, 2023 Nathan Eddy | 3 hours ago 0
AI, Processor Advances Will Improve Application Security
Application Security Cybersecurity Featured Malware News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence 

AI, Processor Advances Will Improve Application Security

February 2, 2023 Michael Vizard | Yesterday 0
OpenSSF Head Delivers AI Warning for Application Security
Application Security Cybersecurity Featured News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

OpenSSF Head Delivers AI Warning for Application Security

February 2, 2023 Michael Vizard | Yesterday 0

Security Humor

‘Finish Him!’ US Kills Huawei With Final Tech Ban

‘Finish Him!’ US Kills Huawei With Final Tech Ban

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.