rep ETSI releases Report on Coordinated Vulnerability Disclosure By www.etsi.org Published On :: Thu, 17 Feb 2022 15:24:03 GMT ETSI releases Report on Coordinated Vulnerability Disclosure - Helping organizations fix security vulnerabilities Sophia Antipolis, 17 February 2022 ETSI has released on 27 January a Guide to Coordinated Vulnerability Disclosure. The Technical Report ETSI TR 103 838 will help companies and organizations of all sizes to implement a vulnerability disclosure process and fix vulnerability issues before they’re publicly disclosed. Read More... Full Article
rep ETSI releases its Annual Report and Work Programme 2022-2023 By www.etsi.org Published On :: Thu, 21 Apr 2022 12:11:02 GMT ETSI releases its Annual Report and Work Programme 2022-2023 Sophia Antipolis, 20 April 2022 ETSI has just released its two activity documents, the Annual Report that looks back on 2021 achievements and the forward looking 2022-2023 Work Programme. Read More... Full Article
rep ETSI Releases first Report on the Role of Hardware in the Security of AI By www.etsi.org Published On :: Thu, 28 Apr 2022 07:58:26 GMT ETSI Releases Group Report on the Role of Hardware in the Security of AI Sophia Antipolis, 28 April 2022 ETSI recently released a Group Report, ETSI GR SAI 006, outlining the role of hardware in the security of artificial intelligence (AI). Read More... Full Article
rep ETSI ISG IPE releases the latest IPv6 Enhanced innovation Report By www.etsi.org Published On :: Thu, 09 Jun 2022 15:03:49 GMT ETSI ISG IPE releases the latest IPv6 Enhanced innovation Report Sophia Antipolis, 9 June 2022 Facilitating IPv6-based Network-Cloud Convergence ETSI has just published a new Group Report (GR), ETSI GR IPE 002, entitled “IPv6 based Data Centres, Network and Cloud Integration”“IPv6 based Data Centres, Network and Cloud Integration”. Developed by the ETSI IPv6 enhanced group (ISG IPE), this Report comprehensively illustrates Network-Cloud convergence architecture and the requirements to the underlying network. In addition, it highlights the role of IPv6 and its enhanced features in Network-Cloud convergence. Read More... Full Article
rep ETSI releases new Report on IPv6-based Blockchain By www.etsi.org Published On :: Wed, 31 Aug 2022 09:39:47 GMT ETSI releases new Report on IPv6-based Blockchain Sophia Antipolis, 31 August 2022 ETSI has just released ETSI GR IPE 012, a new IPv6 Enhanced innovation (IPE) Group Report “IPv6-based Blockchain”. The report outlines how IPv6 can be utilized by blockchain networks to secure direct peer-to-peer payments between end users, as well as the potential future role of IPv6 as vital infrastructure, supporting the blockchain. Read More... Full Article
rep ETSI Mission Critical testing event reports a 96% success rate By www.etsi.org Published On :: Fri, 16 Dec 2022 13:00:57 GMT ETSI Mission Critical testing event reports a 96% success rate Sophia Antipolis, 16 December 2022 The capabilities of Mission Critical Push-to-Talk (MCPTT), Mission Critical Data (MCData) and Mission Critical Video (MCVideo) – together abbreviated as MCX services – were tested during the seventh MCX Plugtests™ from 07 November to 11 November 2022 at the University of Malaga (UMA). The MCX ETSI Plugtests series is the first independent testing of public safety and other mission critical services over LTE and 5G networks. Read More... Full Article
rep ETSI releases new report enabling more transparent security techniques By www.etsi.org Published On :: Mon, 06 Mar 2023 10:16:04 GMT Sophia Antipolis, 6 March 2023 The ETSI group on Encrypted Traffic Integration (ISG ETI) is pleased to announce the release of the group report GR-ETI-002 “Requirements definition and analysis”, the next step for the problems previously outlined in the report GR-ETI-001 “Problem Statement”. Read More... Full Article
rep ETSI NG112 Emergency Communications remote Plugtests Report now available By www.etsi.org Published On :: Fri, 10 Mar 2023 14:42:38 GMT Sophia Antipolis, 10 March 2023 ETSI has just published the Report of the fifth NG112 remote Plugtests™ event, documenting an overall success rate of 100% of the executed tests carried out during the testing sessions. The interoperability event was organized in cooperation with the European Emergency Number Association (EENA), from 23 January to 3 February 2023 with the support of the ETSI Technical Committee Emergency telecommunications. Read More... Full Article
rep ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system By www.etsi.org Published On :: Thu, 20 Jul 2023 16:31:23 GMT Sophia Antipolis, 11 July 2023 ETSI is pleased to announce three new Reports developed by its Securing AI group (ISG SAI). They address explicability and transparency of AI processing and provide an AI computing platform security framework. The last Report is a multi-partner Proofs of Concepts framework. Read More... Full Article
rep ETSI interop event for future rail communication reports a success rate of 86% By www.etsi.org Published On :: Fri, 01 Sep 2023 08:14:11 GMT Sophia Antipolis, 1 September 2023 The Report of the 3rd interoperability Plugtests™ event for the Future Railway Mobile Communication System (FRMCS) is now available. All executed tests achieved an interoperability success rate of 86%. Read More... Full Article
rep ETSI releases World-First Report to Mitigate AI-Generated Deepfakes By www.etsi.org Published On :: Thu, 07 Sep 2023 08:01:05 GMT Sophia Antipolis, 7 September 2023 ETSI is thrilled to announce its new Group Report on Artificial Intelligence on the use of AI for what are commonly referred to as deepfakes. The Report ETSI GR SAI 011, released by the Securing AI (ISG SAI) group, focuses on the use of AI for manipulating multimedia identity representations and illustrates the consequential risks, as well as the measures that can be taken to mitigate them. Read More... Full Article
rep ETSI Mission Critical testing event reports a 95% success rate By www.etsi.org Published On :: Wed, 22 Nov 2023 09:34:28 GMT Sophia Antipolis, 22 November 2023 The Report of the eight MCX Plugtests™ event that took place from 9 October to 13 October 2023 at University of Malaga (UMA) is now available. The Report shows a success rate of 95% interoperability of the 3GPP mission critical services executed tests. Read More... Full Article
rep ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control By www.etsi.org Published On :: Fri, 12 Apr 2024 09:02:36 GMT Sophia Antipolis, 31 January 2024 The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices. Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets. Read More... Full Article
rep ETSI releases its two first reports on THz communication systems By www.etsi.org Published On :: Fri, 12 Apr 2024 08:58:10 GMT Sophia Antipolis, 05 April 2024 ETSI is pleased to announce the release of the first two Group Reports developed by its Terahertz Industry Specification Group (ISG THz). They are addressing key elements in this initial phase of the pre-standardization works for THz communications: the use-cases and the spectrum. The role of ETSI ISG THz is to develop an environment where various actors from the academia, research centres, industry can share, in a consensus-driven way, their pre-standardization efforts on THz technology resulting from various collaborative research projects and global initiatives, paving the way towards future standardization. Complementing the work of other ETSI Technical Bodies and other SDOs, the group concentrates on establishing the technical foundation for the development and standardization of THz communications. Read More... Full Article
rep Preparing for a secure future: industry and business share plans for quantum era at 10th ETSI/IQC Quantum-Safe Cryptography Conference By www.etsi.org Published On :: Mon, 08 Jul 2024 08:56:55 GMT Sophia Antipolis, 24 May 2024 Speakers at the 10th ETSI/IQC Quantum Safe Cryptography Conference have called on organizations to prepare their cybersecurity infrastructures to address the challenges of a post-quantum world. Organized by ETSI and the Institute for Quantum Computing, this year’s conference was hosted from 14-16 May by the Centre for Quantum Technologies (CQT), National University of Singapore (NUS), in partnership with the Infocomm Media Development Authority (IMDA) and the Cyber Security Agency (CSA) of Singapore. The event attracted an impressive 235 onsite delegates from 27 countries, reflecting fast-growing interest worldwide in the critical importance of quantum-safe cryptography in today’s cybersecurity strategies. Read More... Full Article
rep Notice of Ministerial Approval of Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting and Consequential Amendments to OSC Rule 13-502 Fees By www.osc.ca Published On :: Thu, 10 Oct 2024 14:22:57 GMT The Minister of Finance has approved amendments to Ontario Securities Commission (OSC) Rule 91-507 Trade Repositories and Derivatives Data Reporting and consequential amendments to OSC Rule 13-502 Fees (collectively, the Amendments) pursuant to Full Article
rep Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting By www.osc.ca Published On :: Thu, 10 Oct 2024 14:35:58 GMT 1. Ontario Securities Commission Rule 91-507 Trade Repositories and Derivatives Data Reporting is amended by this Instrument. Full Article
rep CSA Multilateral Staff Notice 58-317 - Review of Disclosure Regarding Women on Boards and in Executive Officer Positions - Year 10 Report By www.osc.ca Published On :: Tue, 29 Oct 2024 15:41:58 GMT This document is only available in PDF format. Full Article
rep Detailed Data on CSA Multilateral Staff Notice 58-317 Report on tenth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions By www.osc.ca Published On :: Tue, 29 Oct 2024 15:53:42 GMT Full Article
rep CSA Notice Regarding Coordinated Blanket Order 96-932 Re Temporary Exemptions from Certain Derivatives Data Reporting Requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 18:15:28 GMT This document is only available as a PDF. Full Article
rep OSC Staff Notice 81-736 - Summary Report for Investment Fund and Structured Product Issuers By www.osc.ca Published On :: Tue, 05 Nov 2024 15:32:52 GMT This document is only available in PDF format. Full Article
rep Canadian securities regulators announce results of 10th annual review of representation of women on boards and in executive officer positions in Canada By www.osc.ca Published On :: Tue, 29 Oct 2024 18:20:36 GMT TORONTO – Participating Canadian securities regulators today published the results of their 10th consecutive annual review of disclosures relating to women on boards and in executive officer positions, as well as the underlying data that was used to prepare the report. Full Article
rep Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 17:52:49 GMT TORONTO – The Canadian Securities Administrators (CSA) today published Full Article
rep OSC publishes Summary Report for Investment Fund and Structured Product Issuers By www.osc.ca Published On :: Tue, 05 Nov 2024 15:30:23 GMT TORONTO – The Ontario Securities Commission has today published its Full Article
rep Canadian securities regulators publish report on continuous disclosure reviews By www.osc.ca Published On :: Wed, 06 Nov 2024 19:54:45 GMT TORONTO - The Canadian Securities Administrators (CSA) today published its biennial Full Article
rep 2021 Global food policy report: Transforming food systems after COVID-19: Synopsis [in Chinese] By www.ifpri.org Published On :: Sat, 03 Apr 2021 5:05:01 EDT 2020年在诸多方面都让我们始料未及。新冠肺炎(COVID-19)疫情为全球带来了一场大规模的公共卫生灾难,各国均陷入了疫情及其相关应对政策带来的不同程度的经济困境,面临服务严重中断和人员流动严重受限的局面。无论是富裕国家还是贫穷国家,均未能幸免。在中低收入国家,许多弱势群体直接面临食物安全、医疗和营养方面的威胁。丧失生计、营养不良、教育中断和资源枯竭造成的长期影响可能性非常巨大,特别是对许多国家来说,距离新冠肺炎疫情的结束还遥遥无期。此外,疫情还凸显并加剧了我们食物系统的薄弱环节和不平等状况。一年过去了,全球因新冠肺炎疫情而进一步偏离了到2030年实现可持续发展目标(SDG)的进程。显然,食物系统可以在推动我们走上正轨方面发挥核心作用。要想实现可持续发展目标,就必须对食物系统进行转型,帮助我们更好地为下一次冲击做好准备,同时造福世界贫困人口和弱势群体以及我们的地球。 Full Article
rep 2022 Global food policy report: Climate change and food systems: Synopsis [in Chinese] By www.ifpri.org Published On :: Thu, 19 May 2022 5:05:01 EDT 气候变化对全球食物系统构成的威胁日益严重,对食物和营养安全、生计及全人类整体福祉,尤其是对世界各地的贫困人口和弱势群体造成了严峻影响。我们迫切需要对气候变化采取紧急行动,既要实现限制全球变暖所需的大幅度减排,又要提高适应和应对气候变化的能力,这一点正引起全球的广泛关注。《2022全球食物政策报告》提出了一系列加快行动的机会,这些机会应在制定适应、减缓和应对气候变化的政策与投资决策时加以考虑。 Full Article
rep Global food policy report 2023: Rethinking food crisis responses: Synopsis [in Chinese] By www.ifpri.org Published On :: Fri, 14 Apr 2023 5:05:01 EDT 2022年,世界面临多重危机。旷日持久的2019冠状病毒病疫情(COVID-19)、重大自然灾害、内乱和政治动荡以及气候变化日益严重的影响对食物系统的破坏仍在继续,而与此同时,俄乌战争和通货膨胀加剧了全球粮食和化肥危机。危机数量不断增加,多种危机的叠加影响日益加剧,饥饿人口和流离失所者数量不断攀升,促使人们呼吁重新思考粮食危机应对措施,从而为变革创造了一个真正的机会。 Full Book [download] Full Article
rep Global food policy report 2023: Rethinking food crisis responses: Synopsis [in Arabic] By www.ifpri.org Published On :: Tue, 16 May 2023 5:05:01 EDT لقد واجه العالم الكثير من الازمات خلال عام 2022. واستمرت معاناة النظم الغذائية من تداعيات جائحة كوفيد-19 المطولة، والكوارث الطبيعية الكبرى، والاضطرابات المدنية، وحالة عدم الاستقرار السياسي، والاثار المتزايدة لتغير المناخ، وتفاقمت ازمة الغذاء والأسمدة العالمية نتيجة الحرب الروسية الأوكرانية والتضخم. أدى تزايد عدد الأزمات وتأثيرها المتصاعد، وارتفاع عدد الجياع والنازحين الى الحث على إعادة التفكير في طرق الاستجابة للأزمات الغذائية، مما خلق فرص حقيقية للتغيير. Full Article
rep IFPRI Maize market report October 2024 By massp.ifpri.info Published On :: Mon, 11 Nov 2024 14:48:22 +0000 The Monthly Maize Market Reports are developed by researchers at IFPRI Malawi, with the main goal of providing clear and accurate daily maize price data in selected markets throughout Malawi. The reports are intended as a resource for those interested ... Source: IFPRI Malawi: Malawi Strategy Support Program Full Article Featured Post Malawi Market Reports News Publications food security maize maize markets trade
rep Dominican Republic: Agricultural R&D indicators factsheet [in Spanish] By www.ifpri.org Published On :: Wed, 08 Feb 2023 5:05:01 EST Full Article
rep Informe de políticas alimentarias mundiales 2023: Repensar las respuestas a las crisis alimentarias: Sinopsis By www.ifpri.org Published On :: Fri, 21 Apr 2023 5:05:02 EDT En 2022, el mundo se enfrentó a múltiples crisis. Continuaron las perturbaciones de los sistemas alimentarios debidas a la prolongada pandemia de COVID-19, las grandes catástrofes naturales, los disturbios civiles y la inestabilidad política, así como los crecientes efectos del cambio climático, mientras la guerra entre Rusia y Ucrania y la inflación agravaban una crisis mundial de alimentos y fertilizantes. Full Article
rep Tenable Cloud Risk Report Sounds the Alarm on Toxic Cloud Exposures Threatening Global Organizations By www.tenable.com Published On :: Tue, 08 Oct 2024 09:00:00 -0400 Tenable®, the exposure management company, today released its 2024 Tenable Cloud Risk Report, which examines the critical risks at play in modern cloud environments. Most alarmingly, nearly four in 10 organizations globally are leaving themselves exposed at the highest levels due to the “toxic cloud trilogy” of publicly exposed, critically vulnerable and highly privileged cloud workloads. Each of these misalignments alone introduces risk to cloud data, but the combination of all three drastically elevates the likelihood of exposure access by cyber attackers.Security gaps caused by misconfigurations, risky entitlements and vulnerabilities combine to dramatically increase cloud risk. The Tenable Cloud Risk Report provides a deep dive into the most pressing cloud security issues observed in the first half of 2024, highlighting areas such as identities and permissions, workloads, storage resources, vulnerabilities, containers and Kubernetes. It also offers mitigation guidance for organizations seeking ways to limit exposures in the cloud.Publicly exposed and highly privileged cloud data lead to data leaks. Critical vulnerabilities exacerbate the likelihood of incidents. The report reveals that a staggering 38% of organizations have cloud workloads that meet all three of these toxic cloud trilogy criteria, representing a perfect storm of exposure for cyber attackers to target. When bad actors exploit these exposures, incidents commonly include application disruptions, full system takeovers, and DDoS attacks that are often associated with ransomware. Scenarios like these could devastate an organization, with the 2024 average cost of a single data breach approaching $5 million.1 Additional key findings from the report include: 84% of organizations have risky access keys to cloud resources: The majority of organizations (84.2%) possess unused or longstanding access keys with critical or high severity excessive permissions, a significant security gap that poses substantial risk. 23% of cloud identities have critical or high severity excessive permissions: Analysis of Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure reveals that 23% of cloud identities, both human and non-human, have critical or high severity excessive permissions. Critical vulnerabilities persist: Notably, CVE-2024-21626, a severe container escape vulnerability that could lead to the server host compromise, remained unremediated in over 80% of workloads even 40 days after its publishing. 74% of organizations have publicly exposed storage: 74% of organizations have publicly exposed storage assets, including those in which sensitive data resides. This exposure, often due to unnecessary or excessive permissions, has been linked to increased ransomware attacks. 78% of organizations have publicly accessible Kubernetes API servers: Of these, 41% also allow inbound internet access. Additionally, 58% of organizations have cluster-admin role bindings — which means that certain users have unrestricted control over all the Kubernetes environments.“Our report reveals that an overwhelming number of organizations have access exposures in their cloud workloads of which they may not even be aware,” said Shai Morag, chief product officer, Tenable. “It’s not always about bad actors launching novel attacks. In many instances, misconfigurations and over-privileged access represent the highest risk for cloud data exposures. The good news is, many of these security gaps can be closed easily once they are known and exposed.”The report reflects findings by the Tenable Cloud Research team based on telemetry from millions of cloud resources across multiple public cloud repositories, analyzed from January 1 through June 30, 2024.To download the report today, please visit: https://www.tenable.com/cyber-exposure/tenable-cloud-risk-report-2024 1 IBM Security Cost of a Data Breach Report 2024About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
rep Mitigation Summary Report By www.tenable.com Published On :: Tue, 24 May 2022 08:00:00 -0400 Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.sc Continuous View has the ability to track mitigated vulnerabilities, enabling management to track and measure progress. This report provides technical managers with a clear method to communicate progress to executive management. Throughout the report there is a continued comparison of mitigated vulnerabilities to unmitigated vulnerabilities. The first chapter provides a 3-month trend of vulnerabilities and other related charts focusing on vulnerability counts per subnet. The second chapter provides a series of matrices with an in-depth look at vulnerabilities by severity, by CVSS score, by CVE identifier, and by Nessus and Nessus Network Manager (NNM) plugin groupings. The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are: Tenable.sc 5.0.1 Nessus 8.5.1 LCE 6.0.0 NNM 5.9.0 Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. Tenable.sc Continuous View (CV) provides the ability to report on both current and mitigated vulnerabilities. With more supported technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure, Tenable.sc CV scales to meet future vulnerability management demands for virtualized systems, cloud services, and the proliferation of devices. teams. Chapters Executive Summary - This chapter provides executives with high-level understanding of vulnerability history, and which network segments are at the most risk. The first component is a 3-month trend of vulnerabilities followed by two bar charts. The bar charts provide a side-by-side comparison of vulnerability mitigation by subnet. The vulnerabilities that have been mitigated are in the top bar chart and current vulnerabilities are shown in the following chart. Vulnerability Summaries - This chapter provides a series of matrices showing the relationship between mitigated vulnerabilities and unmitigated. The matrices are created using different criteria. The components provide an analysis using CVSS, CVE, and operating systems. Full Article
rep AI/LLM Findings Report By www.tenable.com Published On :: Mon, 05 Aug 2024 10:19:31 -0400 In an era of rapidly evolving Artificial Intelligence/Large Language Model (AI/LLM) technologies, cybersecurity practitioners face significant challenges in monitoring unauthorized AI solutions, detecting AI vulnerabilities, and identifying unexpected AI/LLM development. Tenable Security Center leverages advanced detection technologies - agents, passive network monitoring, dynamic application security testing, and distributed scan engines - to surface AI/LLM software, libraries, and browser plugins. The risk managers utilize this report to begin a comprehensive review of the AI/LLM packages in systems and web applications, along with associated vulnerabilities, mitigating risks of exploitation, data leakage, and unauthorized resource consumption.AI/LLM technologies are promising and can transform many industries and businesses, offering new innovation and efficiency opportunities. However, the technology represents a huge security challenge at many layers and this impact should not be overlooked. By using Tenable Security Center and Tenable Web App Scanning the organization is able to take a security-first approach. When combined with best practices and robust governance policies, the organizations can harness the power of AI/LLM and mitigate the associated emerging threats. This report provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.ChaptersExecutive Summary: This chapter provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). AI/LLM Browser Extensions Chapter: This chapter provides the details for Assets that we found to have one or more of the AI/LLM detection browser extension plugins detected by Nessus. The chapter will search through plugins that include certain keywords: GPT, CopIlot, or AI. The AI/LLM Browser Detection chart shows the count of plugins related to the detection of GPT, AI, or Copilot AI or LLM browser extensions. AI/LLM Software Detected Using Nessus: This chapter provides the details for Assets that we found to have one or more of the AI/LLM software plugins detected by Nessus. The introductory matrix provides an indicator for all the matches found in the organization, followed by a a chart and table showing the affected assets.AI/LLM Usage Detected Using Web Application Security: This chapter provides the details for web application assets that we found to have one or more of the AI/LLM detection plugins. The LLM/AI Usage Detected by WAS chart shows the count of plugins related to the detection of AI or LLM. Full Article
rep Rapport 2023 sur les politiques alimentaires mondiales: Repenser les réponses aux crises alimentaires: Synopsis By www.ifpri.org Published On :: Wed, 19 Apr 2023 5:05:01 EDT En 2022, le monde a subi des crises multiples. Les perturbations des systèmes alimentaires dues à la longue pandémie de COVID-19, des catastrophes naturelles majeures, des troubles civils, l’instabilité politique et les impacts croissants du changement climatique ont persisté, tandis qe l’inflation et la guerre entre la Russie et l’Ukraine ont exacerbé la crise alimentaire mondiale et la crise des engrais. Full Article
rep 2022 Threat Landscape Report By www.tenable.com Published On :: Wed, 21 Dec 2022 16:55:50 -0500 2022 began with concerns over supply chains and Software Bills of Material (SBOM) as organizations worldwide were forced to reconsider how they respond to incidents in anticipation of the next major event. Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, always at the forefront of trending vulnerabilities and security threats. This dashboard provides a summary of Tenable data that has been compiled over the past year.In a year marked by hacktivism, ransomware and attacks targeting critical infrastructure in a turbulent macroeconomic environment, organizations struggled to keep pace with the demands on cybersecurity teams and resources. Attacks against critical infrastructure remained a common concern. Ransomware continued to wreak havoc, even as some groups had operations shuttered by law enforcement, collapsed under the weight of internal power struggles, or splintered into new groups. New and complex vulnerabilities emerged, providing remediation challenges.Perhaps most alarming is that the vulnerabilities of years past continue to haunt organizations. In fact, known flaws were so prominent inn 2022 that they warranted a spot on Tenable’s list of top vulnerabilities of 2022. We cannot stress this enough: Threat actors continue to find success with known and proven exploitable vulnerabilities that organizations have failed to patch or remediate successfully.The constant evolution of the modern digital environment introduces new challenges for security practitioners. Successful security programs must take a comprehensive approach and understand where the most sensitive data and systems reside and what vulnerabilities or misconfigurations pose the greatest risk. Given the brisk rate of digital transformation, a complete understanding of the external attack surface is paramount.With thousands of new vulnerabilities patched each year, only a small subset will ever see active exploitation. Focusing resources on the vulnerabilities that are exploitable and understanding how attackers chain vulnerabilities and misconfigurations enables security teams to design comprehensive strategies to reduce their overall risk exposure.The Tenable 2022 Threat Landscape Report (TLR) inspects key aspects of the cybersecurity landscape and describes how organizations can revise their programs to focus on reducing risk. The TLR covers:Significant vulnerabilities disclosed and exploited throughout the year, including how common cloud misconfigurations can affect even large tech companiesThe continuous transformation of the ransomware ecosystem and the rise of extortion-only threat groupsOngoing risks, vulnerabilities and attacks within the software supply chainTactics used by advanced persistent threat groups to target organizations with cyber espionage as well as financially motivated attacks.Breach factors and the challenges in analyzing breach data, given the limited information available and lack of detailed reporting requirementsDetails of the key vulnerabilities affecting enterprise softwareTenable Research delivers world class cyber exposure intelligence, data science insights, alerts, and security advisories. The Tenable Research teams perform diverse work that builds the foundation of vulnerability management. The Security Response Team (SRT) tracks threat and vulnerability intelligence feeds and provides rapid insight to the Vulnerability Detection team, enabling them to quickly create plugins and tools that expedite vulnerability detection. This fast turnaround enables customers to gain immediate insight into their current risk posture. Tenable Research has released over 180,000 plugins and leads the industry on CVE coverage. Additionally, the SRT provides breakdowns for the latest vulnerabilities on the Tenable Blog and produces an annual Threat Landscape Report. The SRT continuously analyzes the evolving threat landscape, authors white papers, blogs, Cyber Exposure Alerts, and additional communications to provide customers with comprehensive information to evaluate cyber risk.Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.sc discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. The requirements for this dashboard is: Nessus.ComponentsTLR 2022 – Top 5 Vulnerabilities: This component features the top five vulnerabilities of 2022 as described in Tenable's 2022 Threat Landscape Report: Log4shell, Apache Log4j - CVE-2021-44228, Follina, Microsoft Support Diagnostic Tool - CVE-2022-30190, Atlassian Confluence Server and Data Center - CVE-2022-26134, ProxyShell, Microsoft Exchange Server - CVE-2021-34473, and Known Vulnerabilities - CVE-20XX-XXXX.2022 TLR – Mitigation Tasks: This component provides a list of patches that mitigate the key vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). The Remediation Summary tool uses the concept of a Patch Chain, and identifies the top patch to be remediated for the greatest risk reduction. When the top patch is applied, all other patches in the chain will be remediated.2022 TLR – 90 Day Trend Analysis of Key Vulnerabilities: This component provides a 90-day analysis of the most notable vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). There are over 180 CVEs discussed in the TLR, which, combined with the trend line, helps risk managers determine how risk has been reduced over a period of 90 days. The vulnerability last observed filter is set to 1 day to display risk changes on a daily basis.2022 TLR CVSS to VPR Heat Map: This component provides a correlation between CVSSv3 scores and Vulnerability Priority Rating (VPR) scoring for the key vulnerabilities listed in the 2022 Threat Landscape Report (TLR). The CVSSv3 scores are the standard scoring system used to describe the characteristics and severity of software vulnerabilities. Tenable's VPR helps organizations refine the severity level of vulnerabilities in the environment by leveraging data science analysis and threat modeling based on emerging threats. Each cell is comprised of a combination of cross-mapping of CVSS, VPR scoring, and 2022 CVE identifiers. Using a heat map approach, the filters begin in the left upper corner with vulnerabilities that present least risk. Moving to the right and lower down the matrix the colors change darker from yellow to red as the risk levels increase. Tenable recommends that operations teams prioritize remediation for risks in the lower right corners, and then work towards the upper left cells.2022 TLR – Zero Day Vulnerabilities by Software/Hardware Type: This component displays a list of software/hardware that had zero-day vulnerabilities described in the 2022 Threat Landscape Report (TLR). Each indicator uses CVE from the report through the entire 2022 year. Details are provided in Tenable's 2021 Threat Landscape Report (TLR).2022 TLR Key Vulnerabilities: This component displays cells for the most significant vulnerabilities of 2022 using CVE filters from the 2022 Threat Landscape Report. These filters display the key vulnerabilities from 2022 as well as the notable legacy vulnerabilities from prior years. Details are provided in Tenable's 2022 Threat Landscape Report. Full Article
rep Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies By www.ifpri.org Published On :: Fri, 11 Oct 2024 14:09:33 +0000 Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies Key steps to strengthen institutions and relationships The post Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies appeared first on IFPRI. Full Article
rep Global Food Policy Report 2024: Leveraging plant-source foods for sustainable healthy diets By www.ifpri.org Published On :: Mon, 04 Nov 2024 20:41:01 +0000 Global Food Policy Report 2024: Leveraging plant-source foods for sustainable healthy diets Integrating more fruits, vegetables, and other high-quality crops into food systems. The post Global Food Policy Report 2024: Leveraging plant-source foods for sustainable healthy diets appeared first on IFPRI. Full Article
rep Donia Human Rights Center Panel Discussion | Reproductive Rights as Human Rights: International Perspectives (November 13, 2024 4:00pm) By events.umich.edu Published On :: Thu, 17 Oct 2024 08:56:22 -0400 Event Begins: Wednesday, November 13, 2024 4:00pm Location: Lane Hall Organized By: Donia Human Rights Center Payal Shah, JD, Director, Program on Sexual Violence in Conflict Zones, Physicians for Human Rights; Tamara Dávila, Human Rights Fellow at the Arcus Center for Social Justice Leadership in Kalamazoo College, Michigan; Seda Saluk, Assistant Professor, Women’s and Gender Studies, University of Michigan. Co-sponsored by: U-M Global Feminisms Project, Department of Women's and Gender Studies, Institute for Research on Women and Gender, University of Michigan, and Center for Middle East and North African Studies This interdisciplinary panel will discuss ongoing efforts around the world to defend reproductive justice as an essential human right, tied to the rights to life, health, equality and autonomy. Speakers will address the role of legal and medical professionals as well as scholars and activists in documenting the harm of restrictions on reproductive rights and advocating for victims with particular focus on the U.S., Nicaragua and Turkey. This event is free and open to the public, but registration is required if you intend to participate virtually. Register at: https://myumi.ch/qV9xg CHAIR: Professor Michele Heisler, MD, MPA Professor, Internal Medicine, Health Behavior and Health Equity; Medical Director, Physicians for Human Rights. Dr. Michele Heisler is renowned for her work in advancing health through respect for human rights and addressing social determinants of health. Internationally recognized for her research on the health consequences of human rights violations, she has authored over 300 peer-reviewed articles and has been instrumental in developing protocols, legislation, and partnerships aimed at preventing violence and discrimination. PANELISTS: Payal Shah, JD Director, Program on Sexual Violence in Conflict Zones, Physicians for Human Rights (participating virtually via Zoom) Payal Shah, a distinguished human rights lawyer with over 15 years in gender equality and sexual and reproductive rights advocacy, currently directs a major initiative on reproductive rights at Physicians for Human Rights. Her work focuses on training and advocacy to support survivors of sexual violence and improve forensic evidence collection globally. Tamara Dávila Human Rights Fellow, Arcus Center for Social Justice Leadership, Kalamazoo College, Michigan Tamara Dávila, a Nicaraguan psychologist, feminist activist, and human rights defender, has dedicated her career to advocating for sexual and reproductive rights and supporting survivors of violence. Dávila's activism has led to her imprisonment, and she continues her advocacy work from exile in the United States, focusing on empowering marginalized communities. Seda Saluk, PhD Assistant Professor, Women’s and Gender Studies, University of Michigan Feminist anthropologist Seda Saluk specializes in medical anthropology, science and technology studies, and Middle East studies. Her current book project, “Monitoring Reproduction: Surveillance and Care in Turkey”, investigates the complexities of reproductive surveillance against the backdrop of demographic changes. Her research has been widely supported and published in several leading academic journals. If there is anything we can do to make this event accessible to you, please contact us. Please be aware that advance notice is necessary as some accommodations may require more time for the university to arrange. Full Article Conference / Symposium
rep Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report By www.ifpri.org Published On :: Wed, 28 Aug 2024 17:53:00 +0000 Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report IFPRI’s 2024 Global Food Policy flagship publication arrives at a pivotal moment, as the importance of addressing food systems for better nutrition continues to gain global recognition. With United Nations Framework Convention on Climate Change (UNFCCC) 29th Conference of the Parties taking place in November, the SUN Global Gathering on the horizon and the Nutrition […] The post Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report appeared first on IFPRI. Full Article
rep Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report By www.ifpri.org Published On :: Fri, 08 Nov 2024 14:48:01 +0000 Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report The livestream will be available on this page November 14, 2024 at 2:30pm (EAT) / 6:30am (EST). Despite significant progress in addressing hunger and undernutrition in the early 2000s, malnutrition, in all its forms, remains a major challenge in all regions of the world. Unhealthy diets remain the primary drivers of many forms of malnutrition, […] The post Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report appeared first on IFPRI. Full Article
rep China Agricultural Sector Development Report 2024 and IFPRI 2024 Global Food Policy Report Launch By www.ifpri.org Published On :: Wed, 05 Jun 2024 10:37:57 EDT Hybrid Event: June 7, 2024 - 9:00 AM to 11:30 AM +08. The China Agricultural Sector Development Report 2024 (CASDR) and IFPRI 2024 Global Food Policy Report (GFPR) hybrid launch event will feature keynote speakers as well as presentations on the overview of the GFPR’s and CASDR’s findings. Full Article
rep Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) By www.ifpri.org Published On :: Tue, 19 Mar 2024 11:29:50 +0000 Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) CNBC Africa interviewed John Ulimwengu, IFPRI Senior Research Fellow and the technical editor and lead researcher of the Africa Agriculture Status Report 2023, launched on September 6 at the Africa Food Systems Forum (AGRF). . The Report titled “Empowering Africa’s Food Systems for the Future” highlights the ways in which Africa is uniquely positioned to redefine its future and […] The post Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) appeared first on IFPRI. Full Article
rep The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition By www.ifpri.org Published On :: Wed, 29 May 2024 20:00:50 +0000 The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition Washington DC, May 29, 2024: In the face of growing challenges posed by unhealthy diets, all forms of malnutrition, and environmental constraints, the 2024 Global Food Policy Report (GFPR) — released today by the International Food Policy Research Institute (IFPRI) — underscores the importance of transforming complex global food systems to ensure sustainable healthy diets for all. Progress […] The post The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition appeared first on IFPRI. Full Article
rep Reporting and reproducibility: Proteomics of fish models in environmental toxicology and ecotoxicology - ScienceDirect.com By news.google.com Published On :: Tue, 20 Feb 2024 08:00:00 GMT Reporting and reproducibility: Proteomics of fish models in environmental toxicology and ecotoxicology ScienceDirect.com Full Article
rep Repurposed 3D Printer Allows Economical and Programmable Fraction Collection for Proteomics of Nanogram Scale Samples - ACS Publications By news.google.com Published On :: Fri, 05 Jul 2024 07:00:00 GMT Repurposed 3D Printer Allows Economical and Programmable Fraction Collection for Proteomics of Nanogram Scale Samples ACS Publications Full Article
rep The Future of Proteomics is Up in the Air: Can Ion Mobility Replace Liquid Chromatography for High Throughput Proteomics? - ACS Publications By news.google.com Published On :: Tue, 07 May 2024 07:00:00 GMT The Future of Proteomics is Up in the Air: Can Ion Mobility Replace Liquid Chromatography for High Throughput Proteomics? ACS Publications Full Article
rep Massively parallel sample preparation for multiplexed single-cell proteomics using nPOP - Nature.com By news.google.com Published On :: Thu, 08 Aug 2024 07:00:00 GMT Massively parallel sample preparation for multiplexed single-cell proteomics using nPOP Nature.com Full Article
rep Radio presenter ‘replaced because of accent’ loses race claim By www.personneltoday.com Published On :: Fri, 08 Nov 2024 09:53:25 +0000 A radio presenter who claimed she was replaced because of her Indian accent has lost her claim for race discrimination. The post Radio presenter ‘replaced because of accent’ loses race claim appeared first on Personnel Today. Full Article Latest News Employment tribunals Race discrimination Ethnicity