Monday, May 23, 2022
  • Secure Developer Velocity with Active Testing
  • BSides Prishtina 2022 – Armend Gashi’s ‘What Do OAuth And Football Clubs Have In Common?’
  • The Evolution of Ransomware: Understanding Its Past, Present, and Future
  • XKCD ‘Angular Diameter Turnaround’
  • What is OpenAPI and how does it affect API security?

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Humor Security Bloggers Network 

Home » Cybersecurity » Humor » XKCD, Presidential Succession

SBN

XKCD, Presidential Succession

by Marc Handelman on June 11, 2018

  via   the comic content delivery system known as    Randal Munroe   at    XKCD   !

via the comic content delivery system known as  Randal Munroe at XKCD!

Cybersecurity Live - Boston

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://xkcd.com/2003/

June 11, 2018June 11, 2018 Marc Handelman Sarcasm, satire, XKCD
  • ← Security Boulevard’s 5 Most Read Stories for the Week, June 4-8
  • Keeping your family safe online | Avast →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

More Humor

Humor Security Bloggers Network 

XKCD ‘Angular Diameter Turnaround’

May 23, 2022 Marc Handelman | 4 hours ago 0
Humor Security Bloggers Network 

Joy Of Tech® ‘Elon Can Be Such A Dodo’

May 22, 2022 Marc Handelman | Yesterday 0
Humor Security Bloggers Network 

XKCD ‘Mainly Known For’

May 21, 2022 Marc Handelman | 2 days ago 0
Humor Security Bloggers Network 

Daniel Stori’s ‘$ When You tail -f But Forget To grep’

May 20, 2022 Marc Handelman | 3 days ago 0

Most Read on the Boulevard

Surge in Malware Downloads Driven by SEO-Based Techniques 
‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth
Conti Ransomware Gang Threatens Costa Rica’s Government
US Lawmakers Seek Uniform Policy on Nation-State Cyberattacks
The True Danger for Organizations: Unpatched Vulnerabilities
Radware Mitigates 1.1Tbps DDoS Attack
Tips to Train Your Employees on Cybersecurity
Steganography in Cybersecurity: A Growing Attack Vector
Cloud computing concentration and systemic risk
DNS Over HTTPS: Facts You Should Know

Upcoming Webinars

Thu 26

Challenges and Opportunities for Improving Secure Coding Practices

May 26 @ 3:00 pm - 4:00 pm
Tue 31

Leveraging a Cloud Data Platform to Respond to Cybersecurity Events

May 31 @ 11:00 am - 12:00 pm
Jun 01

The 2022 Guide to API Security

June 1 @ 11:00 am - 12:00 pm
Jun 01

Security From Code to Cloud and Back to Code

June 1 @ 1:00 pm - 2:00 pm
Jun 08

Beyond Unification: How CNAP Should Reduce Cloud Security Risk

June 8 @ 11:00 am - 12:00 pm
Jun 08

When Less Is More: Full Life Cycle Serverless Security

June 8 @ 1:00 pm - 2:00 pm
Jun 15

Top 5 Reasons Why Effective SDLC Security Controls Are So Difficult

June 15 @ 1:00 pm - 2:00 pm
Jun 21

Why Cloud-Native Applications and APIs Are at Risk

June 21 @ 1:00 pm - 2:00 pm
Jun 28

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

June 28 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | 8 hours ago 0
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT
Attorney-Client Privilege and Email Privacy
Cybersecurity Data Security Identity & Access Industry Spotlight Network Security Security Boulevard (Original) 

Attorney-Client Privilege and Email Privacy

April 7, 2022 Mark Rasch | Apr 07 Comments Off on Attorney-Client Privilege and Email Privacy

Top Stories

US Lawmakers Seek Uniform Policy on Nation-State Cyberattacks
Analytics & Intelligence Cyberlaw Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Threats & Breaches 

US Lawmakers Seek Uniform Policy on Nation-State Cyberattacks

May 20, 2022 George V. Hulme | 2 days ago 0
‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth
Analytics & Intelligence Application Security Cybersecurity DevOps Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

May 19, 2022 Richi Jennings | 4 days ago 0
Conti Ransomware Gang Threatens Costa Rica’s Government
Cybersecurity Data Security Featured Governance, Risk & Compliance Malware News Security Boulevard (Original) Spotlight Threat Intelligence Vulnerabilities 

Conti Ransomware Gang Threatens Costa Rica’s Government

May 19, 2022 Nathan Eddy | 4 days ago 0

Security Humor

XKCD 'Angular Diameter Turnaround'

XKCD ‘Angular Diameter Turnaround’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.