repo

ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control

Sophia Antipolis, 31 January 2024

The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices.

Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets.

Read More...




repo

ETSI releases its two first reports on THz communication systems

Sophia Antipolis, 05 April 2024

ETSI is pleased to announce the release of the first two Group Reports developed by its Terahertz Industry Specification Group (ISG THz). They are addressing key elements in this initial phase of the pre-standardization works for THz communications: the use-cases and the spectrum. The role of ETSI ISG THz is to develop an environment where various actors from the academia, research centres, industry can share, in a consensus-driven way, their pre-standardization efforts on THz technology resulting from various collaborative research projects and global initiatives, paving the way towards future standardization. Complementing the work of other ETSI Technical Bodies and other SDOs, the group concentrates on establishing the technical foundation for the development and standardization of THz communications.

Read More...




repo

Notice of Ministerial Approval of Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting and Consequential Amendments to OSC Rule 13-502 Fees

The Minister of Finance has approved amendments to Ontario Securities Commission (OSC) Rule 91-507 Trade Repositories and Derivatives Data Reporting and consequential amendments to OSC Rule 13-502 Fees (collectively, the Amendments) pursuant to




repo

Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting

1. Ontario Securities Commission Rule 91-507 Trade Repositories and Derivatives Data Reporting is amended by this Instrument.




repo

CSA Multilateral Staff Notice 58-317 - Review of Disclosure Regarding Women on Boards and in Executive Officer Positions - Year 10 Report

This document is only available in PDF format.




repo

Detailed Data on CSA Multilateral Staff Notice 58-317 Report on tenth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions




repo

CSA Notice Regarding Coordinated Blanket Order 96-932 Re Temporary Exemptions from Certain Derivatives Data Reporting Requirements

This document is only available as a PDF.




repo

OSC Staff Notice 81-736 - Summary Report for Investment Fund and Structured Product Issuers

This document is only available in PDF format.




repo

Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements

TORONTO – The Canadian Securities Administrators (CSA) today published




repo

OSC publishes Summary Report for Investment Fund and Structured Product Issuers

TORONTO – The Ontario Securities Commission has today published its




repo

Canadian securities regulators publish report on continuous disclosure reviews

TORONTO - The Canadian Securities Administrators (CSA) today published its biennial




repo

2021 Global food policy report: Transforming food systems after COVID-19: Synopsis [in Chinese]

2020年在诸多方面都让我们始料未及。新冠肺炎(COVID-19)疫情为全球带来了一场大规模的公共卫生灾难,各国均陷入了疫情及其相关应对政策带来的不同程度的经济困境,面临服务严重中断和人员流动严重受限的局面。无论是富裕国家还是贫穷国家,均未能幸免。在中低收入国家,许多弱势群体直接面临食物安全、医疗和营养方面的威胁。丧失生计、营养不良、教育中断和资源枯竭造成的长期影响可能性非常巨大,特别是对许多国家来说,距离新冠肺炎疫情的结束还遥遥无期。此外,疫情还凸显并加剧了我们食物系统的薄弱环节和不平等状况。一年过去了,全球因新冠肺炎疫情而进一步偏离了到2030年实现可持续发展目标(SDG)的进程。显然,食物系统可以在推动我们走上正轨方面发挥核心作用。要想实现可持续发展目标,就必须对食物系统进行转型,帮助我们更好地为下一次冲击做好准备,同时造福世界贫困人口和弱势群体以及我们的地球。




repo

2022 Global food policy report: Climate change and food systems: Synopsis [in Chinese]

气候变化对全球食物系统构成的威胁日益严重,对食物和营养安全、生计及全人类整体福祉,尤其是对世界各地的贫困人口和弱势群体造成了严峻影响。我们迫切需要对气候变化采取紧急行动,既要实现限制全球变暖所需的大幅度减排,又要提高适应和应对气候变化的能力,这一点正引起全球的广泛关注。《2022全球食物政策报告》提出了一系列加快行动的机会,这些机会应在制定适应、减缓和应对气候变化的政策与投资决策时加以考虑。




repo

Global food policy report 2023: Rethinking food crisis responses: Synopsis [in Chinese]

2022年,世界面临多重危机。旷日持久的2019冠状病毒病疫情(COVID-19)、重大自然灾害、内乱和政治动荡以及气候变化日益严重的影响对食物系统的破坏仍在继续,而与此同时,俄乌战争和通货膨胀加剧了全球粮食和化肥危机。危机数量不断增加,多种危机的叠加影响日益加剧,饥饿人口和流离失所者数量不断攀升,促使人们呼吁重新思考粮食危机应对措施,从而为变革创造了一个真正的机会。

Full Book [download]




repo

Global food policy report 2023: Rethinking food crisis responses: Synopsis [in Arabic]

لقد واجه العالم الكثير من الازمات خلال عام 2022. واستمرت معاناة النظم الغذائية من تداعيات جائحة كوفيد-19 المطولة، والكوارث الطبيعية الكبرى، والاضطرابات المدنية، وحالة عدم الاستقرار السياسي، والاثار المتزايدة لتغير المناخ، وتفاقمت ازمة الغذاء والأسمدة العالمية نتيجة الحرب الروسية الأوكرانية والتضخم. أدى تزايد عدد الأزمات وتأثيرها المتصاعد، وارتفاع عدد الجياع والنازحين الى الحث على إعادة التفكير في طرق الاستجابة للأزمات الغذائية، مما خلق فرص حقيقية للتغيير.




repo

IFPRI Maize market report October 2024

The Monthly Maize Market Reports are developed by researchers at IFPRI Malawi, with the main goal of providing clear and accurate daily maize price data in selected markets throughout Malawi. The reports are intended as a resource for those interested ... Source: IFPRI Malawi: Malawi Strategy Support Program




repo

Tenable Cloud Risk Report Sounds the Alarm on Toxic Cloud Exposures Threatening Global Organizations

Tenable®, the exposure management company, today released its 2024 Tenable Cloud Risk Report, which examines the critical risks at play in modern cloud environments. Most alarmingly, nearly four in 10 organizations globally are leaving themselves exposed at the highest levels due to the “toxic cloud trilogy” of publicly exposed, critically vulnerable and highly privileged cloud workloads. Each of these misalignments alone introduces risk to cloud data, but the combination of all three drastically elevates the likelihood of exposure access by cyber attackers.

Security gaps caused by misconfigurations, risky entitlements and vulnerabilities combine to dramatically increase cloud risk. The Tenable Cloud Risk Report provides a deep dive into the most pressing cloud security issues observed in the first half of 2024, highlighting areas such as identities and permissions, workloads, storage resources, vulnerabilities, containers and Kubernetes. It also offers mitigation guidance for organizations seeking ways to limit exposures in the cloud.

Publicly exposed and highly privileged cloud data lead to data leaks. Critical vulnerabilities exacerbate the likelihood of incidents. The report reveals that a staggering 38% of organizations have cloud workloads that meet all three of these toxic cloud trilogy criteria, representing a perfect storm of exposure for cyber attackers to target. When bad actors exploit these exposures, incidents commonly include application disruptions, full system takeovers, and DDoS attacks that are often associated with ransomware. Scenarios like these could devastate an organization, with the 2024 average cost of a single data breach approaching $5 million.1 

Additional key findings from the report include: 

  • 84% of organizations have risky access keys to cloud resources: The majority of organizations (84.2%) possess unused or longstanding access keys with critical or high severity excessive permissions, a significant security gap that poses substantial risk. 
  • 23% of cloud identities have critical or high severity excessive permissions: Analysis of Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure reveals that 23% of cloud identities, both human and non-human, have critical or high severity excessive permissions. 
  • Critical vulnerabilities persist: Notably, CVE-2024-21626, a severe container escape vulnerability that could lead to the server host compromise, remained unremediated in over 80% of workloads even 40 days after its publishing. 
  • 74% of organizations have publicly exposed storage: 74% of organizations have publicly exposed storage assets, including those in which sensitive data resides. This exposure, often due to unnecessary or excessive permissions, has been linked to increased ransomware attacks. 
  • 78% of organizations have publicly accessible Kubernetes API servers: Of these, 41% also allow inbound internet access. Additionally, 58% of organizations have cluster-admin role bindings — which means that certain users have unrestricted control over all the Kubernetes environments.

“Our report reveals that an overwhelming number of organizations have access exposures in their cloud workloads of which they may not even be aware,” said Shai Morag, chief product officer, Tenable. “It’s not always about bad actors launching novel attacks. In many instances, misconfigurations and over-privileged access represent the highest risk for cloud data exposures. The good news is, many of these security gaps can be closed easily once they are known and exposed.”

The report reflects findings by the Tenable Cloud Research team based on telemetry from millions of cloud resources across multiple public cloud repositories, analyzed from January 1 through June 30, 2024.

To download the report today, please visit: https://www.tenable.com/cyber-exposure/tenable-cloud-risk-report-2024 

1 IBM Security Cost of a Data Breach Report 2024

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




repo

Mitigation Summary Report

Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.sc Continuous View has the ability to track mitigated vulnerabilities, enabling management to track and measure progress. This report provides technical managers with a clear method to communicate progress to executive management.

Throughout the report there is a continued comparison of mitigated vulnerabilities to unmitigated vulnerabilities. The first chapter provides a 3-month trend of vulnerabilities and other related charts focusing on vulnerability counts per subnet.  The second chapter provides a series of matrices with an in-depth look at vulnerabilities by severity, by CVSS score, by CVE identifier, and by Nessus and Nessus Network Manager (NNM) plugin groupings.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 5.0.1
  • Nessus 8.5.1
  • LCE 6.0.0
  • NNM 5.9.0

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. Tenable.sc Continuous View (CV) provides the ability to report on both current and mitigated vulnerabilities. With more supported technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure, Tenable.sc CV scales to meet future vulnerability management demands for virtualized systems, cloud services, and the proliferation of devices.
teams.

  Chapters

Executive Summary - This chapter provides executives with high-level understanding of vulnerability history, and which network segments are at the most risk. The first component is a 3-month trend of vulnerabilities followed by two bar charts. The bar charts provide a side-by-side comparison of vulnerability mitigation by subnet. The vulnerabilities that have been mitigated are in the top bar chart and current vulnerabilities are shown in the following chart.

Vulnerability Summaries - This chapter provides a series of matrices showing the relationship between mitigated vulnerabilities and unmitigated. The matrices are created using different criteria. The components provide an analysis using CVSS, CVE, and operating systems.
 




repo

AI/LLM Findings Report

In an era of rapidly evolving Artificial Intelligence/Large Language Model (AI/LLM) technologies, cybersecurity practitioners face significant challenges in monitoring unauthorized AI solutions, detecting AI vulnerabilities, and identifying unexpected AI/LLM development. Tenable Security Center leverages advanced detection technologies - agents, passive network monitoring, dynamic application security testing, and distributed scan engines - to surface AI/LLM software, libraries, and browser plugins. The risk managers utilize this report to begin a comprehensive review of the AI/LLM packages in systems and web applications, along with associated vulnerabilities, mitigating risks of exploitation, data leakage, and unauthorized resource consumption.

AI/LLM technologies are promising and can transform many industries and businesses, offering new innovation and efficiency opportunities. However, the technology represents a huge security challenge at many layers and this impact should not be overlooked. By using Tenable Security Center and Tenable Web App Scanning the organization is able to take a security-first approach. When combined with best practices and robust governance policies, the organizations can harness the power of AI/LLM and mitigate the associated emerging threats.  

This report provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.

Chapters

Executive Summary: This chapter provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). 

AI/LLM Browser Extensions Chapter: This chapter provides the details for Assets that we found to have one or more of the AI/LLM detection browser extension plugins detected by Nessus. The chapter will search through plugins that include certain keywords: GPT, CopIlot, or AI. The AI/LLM Browser Detection chart shows the count of plugins related to the detection of GPT, AI, or Copilot AI or LLM browser extensions. 

AI/LLM Software Detected Using Nessus: This chapter provides the details for Assets that we found to have one or more of the AI/LLM software plugins detected by Nessus. The introductory matrix provides an indicator for all the matches found in the organization, followed by a a chart and table showing the affected assets.

AI/LLM Usage Detected Using Web Application Security: This chapter provides the details for web application assets that we found to have one or more of the AI/LLM detection plugins. The LLM/AI Usage Detected by WAS chart shows the count of plugins related to the detection of AI or LLM. 

 




repo

2022 Threat Landscape Report

2022 began with concerns over supply chains and Software Bills of Material (SBOM) as organizations worldwide were forced to reconsider how they respond to incidents in anticipation of the next major event. Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, always at the forefront of trending vulnerabilities and security threats. This dashboard provides a summary of Tenable data that has been compiled over the past year.

In a year marked by hacktivism, ransomware and attacks targeting critical infrastructure in a turbulent macroeconomic environment, organizations struggled to keep pace with the demands on cybersecurity teams and resources. Attacks against critical infrastructure remained a common concern. Ransomware continued to wreak havoc, even as some groups had operations shuttered by law enforcement, collapsed under the weight of internal power struggles, or splintered into new groups. New and complex vulnerabilities emerged, providing remediation challenges.

Perhaps most alarming is that the vulnerabilities of years past continue to haunt organizations. In fact, known flaws were so prominent inn 2022 that they warranted a spot on Tenable’s list of top vulnerabilities of 2022. We cannot stress this enough: Threat actors continue to find success with known and proven exploitable vulnerabilities that organizations have failed to patch or remediate successfully.

The constant evolution of the modern digital environment introduces new challenges for security practitioners. Successful security programs must take a comprehensive approach and understand where the most sensitive data and systems reside and what vulnerabilities or misconfigurations pose the greatest risk. Given the brisk rate of digital transformation, a complete understanding of the external attack surface is paramount.

With thousands of new vulnerabilities patched each year, only a small subset will ever see active exploitation. Focusing resources on the vulnerabilities that are exploitable and understanding how attackers chain vulnerabilities and misconfigurations enables security teams to design comprehensive strategies to reduce their overall risk exposure.

The Tenable 2022 Threat Landscape Report (TLR) inspects key aspects of the cybersecurity landscape and describes how organizations can revise their programs to focus on reducing risk. The TLR covers:

  • Significant vulnerabilities disclosed and exploited throughout the year, including how common cloud misconfigurations can affect even large tech companies
  • The continuous transformation of the ransomware ecosystem and the rise of extortion-only threat groups
  • Ongoing risks, vulnerabilities and attacks within the software supply chain
  • Tactics used by advanced persistent threat groups to target organizations with cyber espionage as well as financially motivated attacks.
  • Breach factors and the challenges in analyzing breach data, given the limited information available and lack of detailed reporting requirements
  • Details of the key vulnerabilities affecting enterprise software

Tenable Research delivers world class cyber exposure intelligence, data science insights, alerts, and security advisories. The Tenable Research teams perform diverse work that builds the foundation of vulnerability management. The Security Response Team (SRT) tracks threat and vulnerability intelligence feeds and provides rapid insight to the Vulnerability Detection team, enabling them to quickly create plugins and tools that expedite vulnerability detection. This fast turnaround enables customers to gain immediate insight into their current risk posture. Tenable Research has released over 180,000 plugins and leads the industry on CVE coverage. Additionally, the SRT provides breakdowns for the latest vulnerabilities on the Tenable Blog and produces an annual Threat Landscape Report. The SRT continuously analyzes the evolving threat landscape, authors white papers, blogs, Cyber Exposure Alerts, and additional communications to provide customers with comprehensive information to evaluate cyber risk.

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.sc discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. The requirements for this dashboard is: Nessus.

Components

TLR 2022 – Top 5 Vulnerabilities:  This component features the top five vulnerabilities of 2022 as described in Tenable's 2022 Threat Landscape Report: Log4shell, Apache Log4j - CVE-2021-44228, Follina, Microsoft Support Diagnostic Tool - CVE-2022-30190, Atlassian Confluence Server and Data Center - CVE-2022-26134, ProxyShell, Microsoft Exchange Server - CVE-2021-34473, and Known Vulnerabilities - CVE-20XX-XXXX.

2022 TLR – Mitigation Tasks:  This component provides a list of patches that mitigate the key vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). The Remediation Summary tool uses the concept of a Patch Chain, and identifies the top patch to be remediated for the greatest risk reduction. When the top patch is applied, all other patches in the chain will be remediated.

2022 TLR – 90 Day Trend Analysis of Key Vulnerabilities: This component provides a 90-day analysis of the most notable vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). There are over 180 CVEs discussed in the TLR, which, combined with the trend line, helps risk managers determine how risk has been reduced over a period of 90 days. The vulnerability last observed filter is set to 1 day to display risk changes on a daily basis.

2022 TLR CVSS to VPR Heat Map: This component provides a correlation between CVSSv3 scores and Vulnerability Priority Rating (VPR) scoring for the key vulnerabilities listed in the 2022 Threat Landscape Report (TLR). The CVSSv3 scores are the standard scoring system used to describe the characteristics and severity of software vulnerabilities. Tenable's VPR helps organizations refine the severity level of vulnerabilities in the environment by leveraging data science analysis and threat modeling based on emerging threats. Each cell is comprised of a combination of cross-mapping of CVSS, VPR scoring, and 2022 CVE identifiers. Using a heat map approach, the filters begin in the left upper corner with vulnerabilities that present least risk.  Moving to the right and lower down the matrix the colors change darker from yellow to red as the risk levels increase.  Tenable recommends that operations teams prioritize remediation for risks in the lower right corners, and then work towards the upper left cells.

2022 TLR – Zero Day Vulnerabilities by Software/Hardware Type: This component displays a list of software/hardware that had zero-day vulnerabilities described in the 2022 Threat Landscape Report (TLR). Each indicator uses CVE from the report through the entire 2022 year. Details are provided in Tenable's 2021 Threat Landscape Report (TLR).

2022 TLR Key Vulnerabilities: This component displays cells for the most significant vulnerabilities of 2022 using CVE filters from the 2022 Threat Landscape Report. These filters display the key vulnerabilities from 2022 as well as the notable legacy vulnerabilities from prior years. Details are provided in Tenable's 2022 Threat Landscape Report.




repo

Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies

Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies

Key steps to strengthen institutions and relationships

The post Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies appeared first on IFPRI.





repo

Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report

Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report

IFPRI’s 2024 Global Food Policy flagship publication arrives at a pivotal moment, as the importance of addressing food systems for better nutrition continues to gain global recognition. With United Nations Framework Convention on Climate Change (UNFCCC) 29th Conference of the Parties taking place in November, the SUN Global Gathering on the horizon and the Nutrition […]

The post Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report appeared first on IFPRI.




repo

Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report

Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report

The livestream will be available on this page November 14, 2024 at 2:30pm (EAT) / 6:30am (EST). Despite significant progress in addressing hunger and undernutrition in the early 2000s, malnutrition, in all its forms, remains a major challenge in all regions of the world. Unhealthy diets remain the primary drivers of many forms of malnutrition, […]

The post Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report appeared first on IFPRI.




repo

China Agricultural Sector Development Report 2024 and IFPRI 2024 Global Food Policy Report Launch

Hybrid Event: June 7, 2024 - 9:00 AM to 11:30 AM +08. The China Agricultural Sector Development Report 2024 (CASDR) and IFPRI 2024 Global Food Policy Report (GFPR) hybrid launch event will feature keynote speakers as well as presentations on the overview of the GFPR’s and CASDR’s findings.




repo

Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) 

Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) 

CNBC Africa interviewed John Ulimwengu, IFPRI Senior Research Fellow and the technical editor and lead researcher of the Africa Agriculture Status Report 2023, launched on September 6 at the Africa Food Systems Forum (AGRF). .  The Report titled “Empowering Africa’s Food Systems for the Future” highlights the ways in which Africa is uniquely positioned to redefine its future and […]

The post Unpacking the 2023 Africa agriculture assessment report (CNBC Africa)  appeared first on IFPRI.




repo

The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition

The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition

Washington DC, May 29, 2024: In the face of growing challenges posed by unhealthy diets, all forms of malnutrition, and environmental constraints, the 2024 Global Food Policy Report (GFPR) — released today by the International Food Policy Research Institute (IFPRI) — underscores the importance of transforming complex global food systems to ensure sustainable healthy diets for all. Progress […]

The post The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition appeared first on IFPRI.





repo

UCLA’s Lindsey T. Kunisaki authors first-of-its-kind Proposition 28 report for Arts for LA

The report finds an arts teacher shortage, gaps in public involvement and capacity issues holding back the full potential of the arts education measure.




repo

Toronto police task force report

The following is a list of University of Toronto experts who can comment on the Toronto police task force report and TAVIS. Rinaldo Walcott, Associate Professor of Sociology Expertise: Race, Black politics, Community criticism of TAVIS Tel: (416) 978‑0400 Email: rinaldo.walcott@utoronto.ca (email is best) Akwasi Owusu-Bempah, Ph.D. Candidate in Centre of Criminology Expertise: Policing challenges, Criminal Justice, […]



  • Breaking News Experts

repo

Research shows that reported oil sands emissions greatly underestimated

TORONTO, ON – A new comprehensive modeling assessment of contamination in the Athabasca Oil Sands Region indicates that officially reported emissions of certain hazardous air pollutants have been greatly underestimated. The results of the assessment, which was carried out by University of Toronto Scarborough Environmental Chemistry professor Frank Wania and his PhD candidate Abha Parajulee, […]



  • Environment & Natural Resources
  • Forestry
  • Science
  • University of Toronto
  • University of Toronto Mississauga
  • University of Toronto Scarborough

repo

Martin Aboriginal Education Initiative and OISE/U of T Respond to Release of the Truth and Reconciliation Commission final report

Toronto, ON — The Truth and Reconciliation Commission’s final report, tabled yesterday, provides an indelible pathway for our individual and collective need to heal and reconcile our past in order to move forward. Central to moving forward on an improved relationship between Indigenous people and Canadians is helping young Indigenous people and families meet and […]




repo

Report reveals seven-year South American malware campaign

Toronto, ON — A number of journalists, activists, politicians and public figures in Latin America have been targeted by a large-scale hacking campaign since 2008, according to a new report from the University of Toronto’s Citizen Lab. Researchers have named the malicious actor behind the attacks as “Packrat,” to highlight the attacker’s preference for Remote […]




repo

New report co-authored by International Human Rights Program says murderous violence against journalists in Honduras is on the rise

TORONTO, ON – Co-authored with PEN Canada and PEN International, report calls for Honduran government to end lethal violence against journalists and its climate of impunity, and for donor states such as the UK and Canada to work with Honduras on these issues Journalists who cover organized crime, government corruption and other sensitive issues are […]




repo

Canada Should Remove Mexico from Refugee ‘Safe’ List - New report highlights how Mexico remains unsafe, particularly for people affected by HIV

New report highlights how Mexico remains unsafe, particularly for people affected by HIVToronto, ON – Canada should remove Mexico from its refugee ‘safe’ list because of the country’s serious human rights abuses, the University of Toronto’s International Human Rights Program (IHRP) said in a new report released today. Failure to do so could place Canada in […]




repo

PEN and IHRP report on India reveals culture of stifling dissent, criminalising free expression

Toronto, ON – An inefficient legal system and what amounts to unchecked abuse of vague and overbroad legislation have contributed to a chilling effect on free speech within India’s society and throughout its public sphere according to a report released today by PEN International, PEN Canada and International Human Rights Program (IHRP) at the University of […]




repo

New Recruiting Technology Trends Report for 2013

Recruiter.com's new 2013 Recruiting Technology Trends Report is available today for free, with no registration required to download. This 29 page report offers HR and recruiting practitioners insight into the major tech trends for the year, and offers useful recruiting advice as well. This exclusive report is loaded with smart advice and intelligent commentary to keep you on the leading edge of our industry. Inside ...




repo

White Paper: Enterprise Quality Inspection and Reporting

Quality is a non-negotiable point in manufacturing, especially when it comes to aerospace and defense parts.




repo

White Paper: 2021 Quality Management Trends Report

To help quality professionals understand how their processes and approaches compare to those of other companies and the future outlook, ENGINE interviewed quality and environmental health and safety (EHS) professionals to develop the present "2021 Quality Management Trends Report," commissioned by Veeva.




repo

Report: Commercial Contractor Confidence Nearly Doubled Since 2023

Just 3% of commercial contractors were pessimistic about the upcoming year in 2024, compared to 22% in 2023.




repo

Report: Heat Pump Market to More Than Double by 2031

The Verified Market Research Report shows that the heat pump market is valued at $74.73 billion in 2024 and is expected to reach $167.32 billion by 2031.




repo

Report Forecasts Growth for Building Automation Market

A study from The Insight Partners projects the value of the global building automation market will move from $76.75 billion last year to more than $167 billion by 2031.




repo

Report Highlights Importance of Refrigerant Reclamation

New report finds that GHGs can be reduced significantly through the use of reclaimed refrigerant versus producing and using newly manufactured virgin refrigerant. 




repo

Trade Groups Report Productive Meetings with Washington Lawmakers

The AHRI’s 2024 Policy Symposium brought more than 200 members, along with AHRI staffers and others in HVAC, to Washington for the lobbying effort, plus panel discussions, keynote speeches, and networking.




repo

Report Cites Four Factors Driving the Global HVAC Market

The global HVAC market is forecast to post a compound annual growth rate (CAGR) of close to 7 percent by 2020, according to the latest report from Technavio. The research study covers the present scenario and growth prospects of the HVAC market from 2016 to 2020.




repo

Infographic: Report - 1 in 4 US Commercial Service Contractors Are Implementing AI

67% of contractors see digital transformation as important to their success.




repo

Custom Reporting Made Easy by ServiceTitan

ServiceTitan software is a platform where residential HVAC, plumbing, and electrical businesses can access everything from call bookings, customer experience ratings, dispatching, marketing campaigns, and financing options for customers.




repo

HARDI Distributors Report 1.6% Revenue Increase in September

The annual sales growth for the 12 months through September 2024 is an increase of 2.3%. 




repo

crash report

Posted by Dmitriy Solodunenko on Oct 31

Ubuntu 24.04
Version: 7.94+SVN
TypeError: Couldn't find foreign struct converter for 'cairo.Context'




repo

PRANA Hack and Leak Report Release

Posted by Dave Aitel via Dailydave on Aug 02

Cordyceps Analysis Report on PRANA Network Hack and Leak Operation:
https://docs.google.com/document/d/1oOJbBTUwyK85ZKYAAdwWqxk-sMvqrBqzJYX1oziTFu4/edit?usp=sharing

Lately I've been reading a lot of academic papers, mostly the Research
Handbook on Cyberwarfare
<https://www.elgaronline.com/edcollchap/book/9781803924854/book-part-9781803924854-6.xml>.
Some of them are good papers! JD Work has a paper in it! But also some of
them get...