security

Chaffetz: I don't understand why Adam Schiff continues to have a security clearance

Fox News contributor Jason Chaffetz and Andy McCarthy react to House Intelligence transcripts on Russia probe.





security

Information Security: New Rules

Warren Buffet once said, "Only when the tide goes out do you discover who's been swimming naked." You can cover over a host of sins when times are good, but bad or unsafe practices will be exposed when times are rough. Time and experience have borne out the accuracy of this witticism in the financial arena -- and we're now seeing its applicability to the intersection of infosec and COVID-19.




security

Flying robots for food security

What is the first thing that comes to mind when you think of drones? Widely known originally for their use for military purposes, increasingly, researchers, aid organizations, governments and private companies are exploring the many ways drones can be used for good. Otherwise known as unmanned aerial vehicles or UAVs, these flying robots have started to transform various industries, including [...]




security

Orphan crops can bring food security to millions of people

Smallholders and people living in rural areas in Africa grow a huge variety of edible plants other than rice, wheat or maize. These crops, including the African yam bean, have long been neglected although they represent an excellent alternative food supplement to most diets. Grown in pockets of tropical Central, West and East Africa, the African yam bean (Sphenostylis stenocarpa) [...]




security

Changing the future of migration by investing in food security and rural development

Migration has always existed. It has been a means to reunite with family, to find better jobs, to have a new experience or to start a better life. In 2015, the number of people migrating was up to 1 out of every 7 people in the world.   When it is a choice, migration can be a good way to spread [...]




security

Empowering rural women is key to ensuring food security

When approaching the small house, Hanen can be seen laughing with her family in the yard. Hanen is a 25-year-old biologist living in Ouled Taleb, Siliana, one of several areas in North West Tunisia that are particularly hard-hit by unemployment, low income and high rates of migration. Hanen comes from a poor rural family, who invested in their children’s education [...]




security

UPDATE - The State of Food Security and Nutrition in the World 2019 Launch

 

The latest edition of The State of Food Security and Nutrition in the World will be launched on Monday 15 July 2019 during a special event on the [...]




security

National Security Letter




security

Computer Security Day 2014

Computer Security Day is an annual event that is observed worldwide on the 30th November. It is designed to raise awareness and to promote best practices in Information Security. The event provides insight into the privacy and security issues surrounding electronically stored sensitive information and offers ways to keep your computer and data safe. To observe this day, CERT-MU, a division of the National Computer Board organised the following events:
 
  • A full day Cyber Security Conference on the 28th November 2014 targeting Business Executive, Senior Management and Information Security Professionals at the Kestrel Hall, Swami Vivekananda International Convention Centre, Pailles.

  • An exhibition to showcase the latest products on Information Security on the 28th November 2014 at the Swami Vivekananda International Convention Centre.

  • A professional training programme on Digital Forensics Investigation Professional in the first week of December 2014.
     

The cyber security conference, exhibition and professional training are being organised in collaboration with Symantec, Secure Services (Mauritius) Limited, Harel Mallac Technologies, Orange, Oracle, Check Point, McAfee, SafeNet and CyberArk.

 
During the full day Cyber Security Conference, distinguished speakers from Mauritius and abroad have been invited to discuss the current challenges and future opportunities in cyber-security. The range of topics that will be covered will allow the participants to:
 
  • Acquire knowledge and to keep up-to-date with the latest technologies on the field of Information Security.
  • Gain an understanding to better safeguard their most valuable information asset.
  • Opportunities to engage with speakers and other attendees during the event.


To learn more about the event please visit the Computer Security Day 2014 website.




security

Computer Security Day 2015

The Computer Emergency Response Team of Mauritius (CERT-MU) a division of the National Computer Board operating under the aegis of the Ministry of Technology, Communication and Innovation organised a cybersecurity conference and an exhibition on the occasion of the Computer Security Day on 30th November 2015 at the Conference Hall, Cyber Tower 1, Ebene. The objective of the event was to raise awareness and promote best practices in Information Security and it was targeted towards IT Professionals, System Administrators, Network & Database Administrators and IT Security Professionals. The cyber security conference was officially opened by Dr. M. Soobron, Ag. Chief Technology Officer of the Ministry of Technology, Communication and Innovation and was attended by some 140 participants.




security

Cyber Security Drill 2016

The Computer Emergency Response Team of Mauritius (CERT-MU) in collaboration with the International Telecommunication Union (ITU) organised the ITU ALERT Cyber Security Drill (Applied Learning for Emergency Response Teams), a five-day regional forum on cybersecurity for the Africa Region at Le Meridien Hotel from the 4th-8th April. It was the third time that this event was held in Africa and a first for Mauritius. The first day was dedicated to a series of workshops on current cybersecurity issues, followed by two days of cyber drill exercises structured around various scenarios involving the most common types of cyberattacks while the sharing sessions provided a platform for cooperation and discussions on cybersecurity and the last two days were dedicated to capacity building session. The cyberdrill exercises were centered on developing threat intelligence capability, malware reengineering and attack scenarios. On the first day there were around 120 participants ranging from IT professionals, system administrators, law enforcement officers, IT security professionals and international delegates. The cyberdrill and workshops were attended by around fifty delegates from all over Africa including Mauritius. The cyberdrill was officially opened by the Honourable Etienne Sinatambou, Minister of Technology, Communication and Innovation.




security

National Cyber Security Drill for Critical Information Infrastructures (CIIs)

Cyber risk is now one of the most commonly talked about topics as the impact of cybercrime reaches an all-time high. Heavily connected industries, such as financial services and critical national infrastructure (CNI) pose a systemic risk to the markets they serve. We are now seeing national cybersecurity incident simulation exercises being carried out by governments and/or industry associations. This helps to exercise the reaction to cybersecurity incidents, which impact various parts of the supply chain, from financial transactions to the operational technology that underpins our daily lives.
 In line with this, the Computer Emergency Response Team of Mauritius (CERT-MU), a division of the National Computer Board operating under the aegis of the Ministry of Technology, Communication & Innovation is organizing a National Cybersecurity Drill from the 25th – 28th June 2019 for the Financial Sector and the Civil Aviation Department. The main objective of the 4 days’ event is to assess the preparedness of these sectors to resist cyber threats and enable timely detection, response, and mitigation and recovery actions in the event of cyber-attacks.
The activities to be organized are as follows:
·         One-day workshop on Cyber Attack Preparedness & Response (25th June 2019)
·         Three-days Cyber Drill exercise (26th – 28th June 2019)




security

Food security fears after COVID-19 case closes La Loche, Sask., grocery store

One of the two grocery stores in La Loche, Sask., has shut temporarily after one of its employees tested positive for COVID-19, according to an executive at the North West Company. 




security

Dealing with Savimbi's Ghost: The Security and Humanitarian Challenges in Angola




security

Zimbabwe: Political and Security Challenges to the Transition




security

Implementing Peace and Security Architecture (II): Southern Africa

To preserve Southern Africa’s relative peace in the face of rising challenges and threats, Southern African Development Community (SADC) member states must collectively reinforce its peace and security architecture.




security

Fear, insecurity and a zeal for Jezreel

A zeal for the Jezreel Valley overcomes fear and insecurity.




security

Data Security and Privacy

Many state and local education agency websites aren't disclosing the presence of third-party tracking services, which can use information about users' browsing.




security

K-12 Tech Leaders Prioritize Cybersecurity, But Many Underestimate Risks, Survey Says

Less than 20 percent of respondents to a new CoSN survey marked any items on a list of cybersecurity threats as "high-risk" from their perspective.




security

Fewer Fights and Increased Security: What New Data Say About School Safety

Amid public concerns about school safety fueled by high-profile school shootings, new federal data show reports of student fights, bullying, and other forms of victimization have continued a decades-long trend of decline. At the same time, schools have ramped up security measures, like the use of ca




security

Gender Differences in Food Insecurity and Morbidity Among Adolescents in Southwest Ethiopia

The associations between food insecurity and child well-being have been well studied on the basis of household levels of food insecurity, as reported by heads of households.

Household measures, however, may not capture gender biases in food insecurity and morbidity. This study assessed adolescents' own experience with food insecurity and how it was associated with morbidity and the effect of gender in this process. (Read the full article)




security

Maternal Resolution of Grief After Preterm Birth: Implications for Infant Attachment Security

For mothers of children with chronic medical conditions or disabilities, such as epilepsy or cerebral palsy, a history of maternal unresolved grief regarding the child's diagnosis has been associated with insecure infant-mother attachment.

Unresolved grief related to a preterm birth is associated with the development of insecure infantmother attachment. Mothers with resolved grief after preterm birth are 2.9 times as likely to have securely attached infants, compared with mothers with unresolved grief. (Read the full article)




security

Food Insecurity and Obesogenic Maternal Infant Feeding Styles and Practices in Low-Income Families

Food insecurity has been linked to childhood obesity in a number of studies. Few studies have explored potential pathways through which food insecurity is related to child weight, especially in low-income families with young infants.

We found that food insecurity was related to maternal controlling feeding styles and concerns about the infants’ future weight. Early obesity prevention should aim to decrease food insecurity and to reduce controlling feeding styles in families who remain food insecure. (Read the full article)




security

Local Food Prices and Their Associations With Children's Weight and Food Security

A growing body of research suggests that the food environment affects children’s weight. Specifically, living in areas with higher-priced fast foods and soda is associated with lower weight and BMI, whereas higher fruit and vegetable prices demonstrate the opposite association.

Using longitudinal data on lower-income young children, this study finds that higher-priced fruits and vegetables are associated with higher child BMI, but not food insecurity, and that this relationship is driven by the prices of fresh fruits and vegetables. (Read the full article)




security

Supplemental Nutrition Assistance Program Participation and Child Food Security

Recent studies have shown that participating in the Supplemental Nutrition Assistance Program (SNAP) is associated with improved household food security. With the exception of 1 descriptive analysis, studies have not examined how SNAP affects children’s food security.

This article estimates the association between SNAP and children’s food security using the largest, most rigorous national study of food security to date. Given current proposals to reduce program size, this study underscores SNAP’s importance in affecting children’s well-being. (Read the full article)




security

Validity of a Single Item Food Security Questionnaire in Arctic Canada

Food insecurity is best measured by comprehensive assessments. However, rapid assessments can be useful in certain circumstances, but their validity is not characterized.

Rapid assessment of food insecurity is feasible among Inuit adults and children. (Read the full article)




security

Find an Xbox Security Bug? Microsoft Might Have Some Cash for You

Microsoft notes it can pay bug bounty participants more than $20,000, depending on the vulnerability's severity and the report's quality. Just make sure you don't use the flaw on unsuspecting users.




security

DRC Update: Building security for the elections




security

Africa Needs Aid for Security not Just Poverty




security

Inclusive Security: Hope for Congo




security

Security Sector Reform in the Congo




security

Congo Crimes Should Be on the Agenda of the UN Security Council

The UN's release of a long awaited report on crimes committed in the Democratic Republic of Congo between 1993-2003 is not only an opportunity to re-examine the historical record of mass violence in DRC -- the scale and nature of which was often overlooked in the wake of the genocide in neighboring Rwanda -- but is also a chance to correct the terms of the deceptive and fragile peace some leaders wish to proclaim in the resource-rich Great Lakes region of Africa.




security

Implementing Peace and Security Architecture (I): Central Africa

More than a decade after the Economic Community of Central African States (ECCAS) was requested by the African Union (AU) to give life to a new peace and security architecture, political and security cooperation on the continent is still in need of reinforcement.




security

The Security Challenges of Pastoralism in Central Africa

Sensible, inclusive regulation of pastoralism that has mitigated tension in parts of the Sahel should be extended to the Democratic Republic of Congo (DRC) and the Central African Republic (CAR), where conflicts have worsened with the southward expansion of pastoralism.




security

Cybersecurity professional speaks to students via Zoom

Penn State Greater Allegheny’s current students recently joined a virtual conversation about Cybersecurity Analytics and Operations, Greater Allegheny’s newest 4-year program starting this fall.




security

Attention all Zoom users: New security settings to take effect on May 11

Zoom-bombings have been making headlines across the country this spring, and Penn State is no exception to the increase in security threats and breaches. To address these recent incidents in Zoom meetings, University-wide Zoom default setting changes will be implemented on May 11.




security

'Ahead-of-the-trend' College of IST prepared security adviser for his career

The experiences that Chris Eggerman, a 2017 graduate, had while at Penn State gave him a glimpse of the challenges and rewards he would enjoy in a career, and, paired with his education in the College of Information Sciences and Technology, equipped him with the skills he uses in his current profession as a security adviser at Liberty Mutual.




security

IST professor receives Fulbright Cyber Security Award

Anna Squicciarini, associate professor of information sciences and technology, has received a Fulbright Cyber Security Award to conduct research in London in summer 2021.




security

The Real Reason I Don't Have a Security Camera

Security expert Max Eddy doesn't want creepers spying on him (or his dog) through insecure hardware, but that's not why he doesn't have internet-connected cameras in his home.




security

Man hit, killed by Southwest plane after security breach at airport

The man hopped the airport perimeter fence, an airport spokesperson confirmed.




security

Men arrested in killing of Family Dollar security guard after face mask dispute

The U.S. coronavirus death toll has surpassed 77,000.




security

UK to Work With Huawei on 5G, Despite Security Concerns Abroad

The choice to let Huawei access non-core parts of the country's networks could place strain on the UK's relationship with the US. But with Brexit looming, the cost of cutting Huawei out could be too great.




security

Apple Caving on Hong Kong Shows the Limits of Security as a Sales Tool

Security expert Max Eddy explains how Apple banning an app used by pro-democracy protesters shows how even the best consumer security polices fail when there's a lack of will to enforce them appropriately.




security

When National Security Threats Influence Education Policy and Politics

A new research study, released just a few days before the U.S. military killed a top Iranian military commander and escalated international tensions, looked at connections between sudden national security crises and education policymaking in Washington.




security

The Best Hosted Endpoint Protection and Security Software for 2020

Enterprises and small to midsize businesses (SMBs) require rock-solid endpoint security. The challenge is determining the right features to best keep exploits at bay. We put the leading solutions to the test to find the best options for your business.




security

Exclusive: Bitdefender Finds Security Hole in Wemo Smart Plug

Belkin's smart plug lets you use your smartphone to turn your devices on and off from anywhere, but Bitdefender found some holes in its security. Don't worry, Belkin has fixed the problem.




security

Feds Say Foreign Drones Are a Security Risk, Want US-Made Fleet

The Secretary of the Interior has signed an order that calls for the US 'domestic production capability' to build small unmanned drones. China-based DJI accused the department of imposing 'politically motivated country of origin restrictions masquerading as cybersecurity concern.'




security

Insurance Data Security Act Signed into Law

On Wednesday, July 31, 2019, Governor John C. Carney, Jr., signed House Bill 174 (“HB 174”) into law. Titled the Delaware Insurance Data Security Act, this law is based on an NAIC Model Act, which establishes a comprehensive regulatory framework requiring insurers licensed to do business in Delaware to implement information security programs, report instances […]




security

India Tops Zoom Downloads in April Despite Warnings, Security Issues

Zoom has gained immense popularity in India despite the government warning against it, and advising users to opt for other alternatives. According to app intelligence firm Sensor Tower, India...




security

A new article, "Contributing to food safety and security" has been added to "Stories".



  • Technology & Design