rep

ETSI releases Report on Coordinated Vulnerability Disclosure

ETSI releases Report on Coordinated Vulnerability Disclosure - Helping organizations fix security vulnerabilities

Sophia Antipolis, 17 February 2022

ETSI has released on 27 January a Guide to Coordinated Vulnerability Disclosure. The Technical Report ETSI TR 103 838 will help companies and organizations of all sizes to implement a vulnerability disclosure process and fix vulnerability issues before they’re publicly disclosed.

Read More...




rep

ETSI releases its Annual Report and Work Programme 2022-2023

ETSI releases its Annual Report and Work Programme 2022-2023

Sophia Antipolis, 20 April 2022

ETSI has just released its two activity documents, the Annual Report that looks back on 2021 achievements and the forward looking 2022-2023 Work Programme.

Read More...




rep

ETSI Releases first Report on the Role of Hardware in the Security of AI

ETSI Releases Group Report on the Role of Hardware in the Security of AI

Sophia Antipolis, 28 April 2022

ETSI recently released a Group Report, ETSI GR SAI 006, outlining the role of hardware in the security of artificial intelligence (AI).

Read More...




rep

ETSI ISG IPE releases the latest IPv6 Enhanced innovation Report

ETSI ISG IPE releases the latest IPv6 Enhanced innovation Report

Sophia Antipolis, 9 June 2022

Facilitating IPv6-based Network-Cloud Convergence

ETSI has just published a new Group Report (GR), ETSI GR IPE 002, entitled “IPv6 based Data Centres, Network and Cloud Integration”“IPv6 based Data Centres, Network and Cloud Integration”. Developed by the ETSI IPv6 enhanced group (ISG IPE), this Report comprehensively illustrates Network-Cloud convergence architecture and the requirements to the underlying network. In addition, it highlights the role of IPv6 and its enhanced features in Network-Cloud convergence.

Read More...




rep

ETSI releases new Report on IPv6-based Blockchain

ETSI releases new Report on IPv6-based Blockchain

Sophia Antipolis, 31 August 2022

ETSI has just released ETSI GR IPE 012, a new IPv6 Enhanced innovation (IPE) Group Report “IPv6-based Blockchain”. The report outlines how IPv6 can be utilized by blockchain networks to secure direct peer-to-peer payments between end users, as well as the potential future role of IPv6 as vital infrastructure, supporting the blockchain.

Read More...




rep

ETSI Mission Critical testing event reports a 96% success rate

ETSI Mission Critical testing event reports a 96% success rate

Sophia Antipolis, 16 December 2022

The capabilities of Mission Critical Push-to-Talk (MCPTT), Mission Critical Data (MCData) and Mission Critical Video (MCVideo) – together abbreviated as MCX services – were tested during the seventh MCX Plugtests™ from 07 November to 11 November 2022 at the University of Malaga (UMA). The MCX ETSI Plugtests series is the first independent testing of public safety and other mission critical services over LTE and 5G networks.

Read More...




rep

ETSI releases new report enabling more transparent security techniques

Sophia Antipolis, 6 March 2023

The ETSI group on Encrypted Traffic Integration (ISG ETI) is pleased to announce the release of the group report GR-ETI-002 “Requirements definition and analysis”, the next step for the problems previously outlined in the report GR-ETI-001 “Problem Statement”.

Read More...




rep

ETSI NG112 Emergency Communications remote Plugtests Report now available

Sophia Antipolis, 10 March 2023

ETSI has just published the Report of the fifth NG112 remote Plugtests™ event, documenting an overall success rate of 100% of the executed tests carried out during the testing sessions. The interoperability event was organized in cooperation with the European Emergency Number Association (EENA), from 23 January to 3 February 2023 with the support of the ETSI Technical Committee Emergency telecommunications.

Read More...




rep

ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system

Sophia Antipolis, 11 July 2023

ETSI is pleased to announce three new Reports developed by its Securing AI group (ISG SAI). They address explicability and transparency of AI processing and provide an AI computing platform security framework. The last Report is a multi-partner Proofs of Concepts framework.

Read More...




rep

ETSI interop event for future rail communication reports a success rate of 86%

Sophia Antipolis, 1 September 2023

The Report of the 3rd interoperability Plugtests™ event for the Future Railway Mobile Communication System (FRMCS) is now available. All executed tests achieved an interoperability success rate of 86%.

Read More...




rep

ETSI releases World-First Report to Mitigate AI-Generated Deepfakes

Sophia Antipolis, 7 September 2023

ETSI is thrilled to announce its new Group Report on Artificial Intelligence on the use of AI for what are commonly referred to as deepfakes. The Report ETSI GR SAI 011, released by the Securing AI (ISG SAI) group, focuses on the use of AI for manipulating multimedia identity representations and illustrates the consequential risks, as well as the measures that can be taken to mitigate them.

Read More...




rep

ETSI Mission Critical testing event reports a 95% success rate

Sophia Antipolis, 22 November 2023

The Report of the eight MCX Plugtests™ event that took place from 9 October to 13 October 2023 at University of Malaga (UMA) is now available. The Report shows a success rate of 95% interoperability of the 3GPP mission critical services executed tests.  

Read More...




rep

ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control

Sophia Antipolis, 31 January 2024

The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices.

Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets.

Read More...




rep

ETSI releases its two first reports on THz communication systems

Sophia Antipolis, 05 April 2024

ETSI is pleased to announce the release of the first two Group Reports developed by its Terahertz Industry Specification Group (ISG THz). They are addressing key elements in this initial phase of the pre-standardization works for THz communications: the use-cases and the spectrum. The role of ETSI ISG THz is to develop an environment where various actors from the academia, research centres, industry can share, in a consensus-driven way, their pre-standardization efforts on THz technology resulting from various collaborative research projects and global initiatives, paving the way towards future standardization. Complementing the work of other ETSI Technical Bodies and other SDOs, the group concentrates on establishing the technical foundation for the development and standardization of THz communications.

Read More...




rep

Preparing for a secure future: industry and business share plans for quantum era at 10th ETSI/IQC Quantum-Safe Cryptography Conference

Sophia Antipolis, 24 May 2024

Speakers at the 10th ETSI/IQC Quantum Safe Cryptography Conference have called on organizations to prepare their cybersecurity infrastructures to address the challenges of a post-quantum world.

Organized by ETSI and the Institute for Quantum Computing, this year’s conference was hosted from 14-16 May by the Centre for Quantum Technologies (CQT), National University of Singapore (NUS), in partnership with the Infocomm Media Development Authority (IMDA) and the Cyber Security Agency (CSA) of Singapore. The event attracted an impressive 235 onsite delegates from 27 countries, reflecting fast-growing interest worldwide in the critical importance of quantum-safe cryptography in today’s cybersecurity strategies.

Read More...




rep

Notice of Ministerial Approval of Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting and Consequential Amendments to OSC Rule 13-502 Fees

The Minister of Finance has approved amendments to Ontario Securities Commission (OSC) Rule 91-507 Trade Repositories and Derivatives Data Reporting and consequential amendments to OSC Rule 13-502 Fees (collectively, the Amendments) pursuant to




rep

Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting

1. Ontario Securities Commission Rule 91-507 Trade Repositories and Derivatives Data Reporting is amended by this Instrument.




rep

CSA Multilateral Staff Notice 58-317 - Review of Disclosure Regarding Women on Boards and in Executive Officer Positions - Year 10 Report

This document is only available in PDF format.




rep

Detailed Data on CSA Multilateral Staff Notice 58-317 Report on tenth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions




rep

CSA Notice Regarding Coordinated Blanket Order 96-932 Re Temporary Exemptions from Certain Derivatives Data Reporting Requirements

This document is only available as a PDF.




rep

OSC Staff Notice 81-736 - Summary Report for Investment Fund and Structured Product Issuers

This document is only available in PDF format.




rep

Canadian securities regulators announce results of 10th annual review of representation of women on boards and in executive officer positions in Canada

TORONTO – Participating Canadian securities regulators today published the results of their 10th consecutive annual review of disclosures relating to women on boards and in executive officer positions, as well as the underlying data that was used to prepare the report.




rep

Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements

TORONTO – The Canadian Securities Administrators (CSA) today published




rep

OSC publishes Summary Report for Investment Fund and Structured Product Issuers

TORONTO – The Ontario Securities Commission has today published its




rep

Canadian securities regulators publish report on continuous disclosure reviews

TORONTO - The Canadian Securities Administrators (CSA) today published its biennial




rep

2021 Global food policy report: Transforming food systems after COVID-19: Synopsis [in Chinese]

2020年在诸多方面都让我们始料未及。新冠肺炎(COVID-19)疫情为全球带来了一场大规模的公共卫生灾难,各国均陷入了疫情及其相关应对政策带来的不同程度的经济困境,面临服务严重中断和人员流动严重受限的局面。无论是富裕国家还是贫穷国家,均未能幸免。在中低收入国家,许多弱势群体直接面临食物安全、医疗和营养方面的威胁。丧失生计、营养不良、教育中断和资源枯竭造成的长期影响可能性非常巨大,特别是对许多国家来说,距离新冠肺炎疫情的结束还遥遥无期。此外,疫情还凸显并加剧了我们食物系统的薄弱环节和不平等状况。一年过去了,全球因新冠肺炎疫情而进一步偏离了到2030年实现可持续发展目标(SDG)的进程。显然,食物系统可以在推动我们走上正轨方面发挥核心作用。要想实现可持续发展目标,就必须对食物系统进行转型,帮助我们更好地为下一次冲击做好准备,同时造福世界贫困人口和弱势群体以及我们的地球。




rep

2022 Global food policy report: Climate change and food systems: Synopsis [in Chinese]

气候变化对全球食物系统构成的威胁日益严重,对食物和营养安全、生计及全人类整体福祉,尤其是对世界各地的贫困人口和弱势群体造成了严峻影响。我们迫切需要对气候变化采取紧急行动,既要实现限制全球变暖所需的大幅度减排,又要提高适应和应对气候变化的能力,这一点正引起全球的广泛关注。《2022全球食物政策报告》提出了一系列加快行动的机会,这些机会应在制定适应、减缓和应对气候变化的政策与投资决策时加以考虑。




rep

Global food policy report 2023: Rethinking food crisis responses: Synopsis [in Chinese]

2022年,世界面临多重危机。旷日持久的2019冠状病毒病疫情(COVID-19)、重大自然灾害、内乱和政治动荡以及气候变化日益严重的影响对食物系统的破坏仍在继续,而与此同时,俄乌战争和通货膨胀加剧了全球粮食和化肥危机。危机数量不断增加,多种危机的叠加影响日益加剧,饥饿人口和流离失所者数量不断攀升,促使人们呼吁重新思考粮食危机应对措施,从而为变革创造了一个真正的机会。

Full Book [download]




rep

Global food policy report 2023: Rethinking food crisis responses: Synopsis [in Arabic]

لقد واجه العالم الكثير من الازمات خلال عام 2022. واستمرت معاناة النظم الغذائية من تداعيات جائحة كوفيد-19 المطولة، والكوارث الطبيعية الكبرى، والاضطرابات المدنية، وحالة عدم الاستقرار السياسي، والاثار المتزايدة لتغير المناخ، وتفاقمت ازمة الغذاء والأسمدة العالمية نتيجة الحرب الروسية الأوكرانية والتضخم. أدى تزايد عدد الأزمات وتأثيرها المتصاعد، وارتفاع عدد الجياع والنازحين الى الحث على إعادة التفكير في طرق الاستجابة للأزمات الغذائية، مما خلق فرص حقيقية للتغيير.




rep

IFPRI Maize market report October 2024

The Monthly Maize Market Reports are developed by researchers at IFPRI Malawi, with the main goal of providing clear and accurate daily maize price data in selected markets throughout Malawi. The reports are intended as a resource for those interested ... Source: IFPRI Malawi: Malawi Strategy Support Program




rep

Dominican Republic: Agricultural R&D indicators factsheet [in Spanish]




rep

Informe de políticas alimentarias mundiales 2023: Repensar las respuestas a las crisis alimentarias: Sinopsis

En 2022, el mundo se enfrentó a múltiples crisis. Continuaron las perturbaciones de los sistemas alimentarios debidas a la prolongada pandemia de COVID-19, las grandes catástrofes naturales, los disturbios civiles y la inestabilidad política, así como los crecientes efectos del cambio climático, mientras la guerra entre Rusia y Ucrania y la inflación agravaban una crisis mundial de alimentos y fertilizantes.




rep

Tenable Cloud Risk Report Sounds the Alarm on Toxic Cloud Exposures Threatening Global Organizations

Tenable®, the exposure management company, today released its 2024 Tenable Cloud Risk Report, which examines the critical risks at play in modern cloud environments. Most alarmingly, nearly four in 10 organizations globally are leaving themselves exposed at the highest levels due to the “toxic cloud trilogy” of publicly exposed, critically vulnerable and highly privileged cloud workloads. Each of these misalignments alone introduces risk to cloud data, but the combination of all three drastically elevates the likelihood of exposure access by cyber attackers.

Security gaps caused by misconfigurations, risky entitlements and vulnerabilities combine to dramatically increase cloud risk. The Tenable Cloud Risk Report provides a deep dive into the most pressing cloud security issues observed in the first half of 2024, highlighting areas such as identities and permissions, workloads, storage resources, vulnerabilities, containers and Kubernetes. It also offers mitigation guidance for organizations seeking ways to limit exposures in the cloud.

Publicly exposed and highly privileged cloud data lead to data leaks. Critical vulnerabilities exacerbate the likelihood of incidents. The report reveals that a staggering 38% of organizations have cloud workloads that meet all three of these toxic cloud trilogy criteria, representing a perfect storm of exposure for cyber attackers to target. When bad actors exploit these exposures, incidents commonly include application disruptions, full system takeovers, and DDoS attacks that are often associated with ransomware. Scenarios like these could devastate an organization, with the 2024 average cost of a single data breach approaching $5 million.1 

Additional key findings from the report include: 

  • 84% of organizations have risky access keys to cloud resources: The majority of organizations (84.2%) possess unused or longstanding access keys with critical or high severity excessive permissions, a significant security gap that poses substantial risk. 
  • 23% of cloud identities have critical or high severity excessive permissions: Analysis of Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure reveals that 23% of cloud identities, both human and non-human, have critical or high severity excessive permissions. 
  • Critical vulnerabilities persist: Notably, CVE-2024-21626, a severe container escape vulnerability that could lead to the server host compromise, remained unremediated in over 80% of workloads even 40 days after its publishing. 
  • 74% of organizations have publicly exposed storage: 74% of organizations have publicly exposed storage assets, including those in which sensitive data resides. This exposure, often due to unnecessary or excessive permissions, has been linked to increased ransomware attacks. 
  • 78% of organizations have publicly accessible Kubernetes API servers: Of these, 41% also allow inbound internet access. Additionally, 58% of organizations have cluster-admin role bindings — which means that certain users have unrestricted control over all the Kubernetes environments.

“Our report reveals that an overwhelming number of organizations have access exposures in their cloud workloads of which they may not even be aware,” said Shai Morag, chief product officer, Tenable. “It’s not always about bad actors launching novel attacks. In many instances, misconfigurations and over-privileged access represent the highest risk for cloud data exposures. The good news is, many of these security gaps can be closed easily once they are known and exposed.”

The report reflects findings by the Tenable Cloud Research team based on telemetry from millions of cloud resources across multiple public cloud repositories, analyzed from January 1 through June 30, 2024.

To download the report today, please visit: https://www.tenable.com/cyber-exposure/tenable-cloud-risk-report-2024 

1 IBM Security Cost of a Data Breach Report 2024

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




rep

Mitigation Summary Report

Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.sc Continuous View has the ability to track mitigated vulnerabilities, enabling management to track and measure progress. This report provides technical managers with a clear method to communicate progress to executive management.

Throughout the report there is a continued comparison of mitigated vulnerabilities to unmitigated vulnerabilities. The first chapter provides a 3-month trend of vulnerabilities and other related charts focusing on vulnerability counts per subnet.  The second chapter provides a series of matrices with an in-depth look at vulnerabilities by severity, by CVSS score, by CVE identifier, and by Nessus and Nessus Network Manager (NNM) plugin groupings.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 5.0.1
  • Nessus 8.5.1
  • LCE 6.0.0
  • NNM 5.9.0

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. Tenable.sc Continuous View (CV) provides the ability to report on both current and mitigated vulnerabilities. With more supported technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure, Tenable.sc CV scales to meet future vulnerability management demands for virtualized systems, cloud services, and the proliferation of devices.
teams.

  Chapters

Executive Summary - This chapter provides executives with high-level understanding of vulnerability history, and which network segments are at the most risk. The first component is a 3-month trend of vulnerabilities followed by two bar charts. The bar charts provide a side-by-side comparison of vulnerability mitigation by subnet. The vulnerabilities that have been mitigated are in the top bar chart and current vulnerabilities are shown in the following chart.

Vulnerability Summaries - This chapter provides a series of matrices showing the relationship between mitigated vulnerabilities and unmitigated. The matrices are created using different criteria. The components provide an analysis using CVSS, CVE, and operating systems.
 




rep

AI/LLM Findings Report

In an era of rapidly evolving Artificial Intelligence/Large Language Model (AI/LLM) technologies, cybersecurity practitioners face significant challenges in monitoring unauthorized AI solutions, detecting AI vulnerabilities, and identifying unexpected AI/LLM development. Tenable Security Center leverages advanced detection technologies - agents, passive network monitoring, dynamic application security testing, and distributed scan engines - to surface AI/LLM software, libraries, and browser plugins. The risk managers utilize this report to begin a comprehensive review of the AI/LLM packages in systems and web applications, along with associated vulnerabilities, mitigating risks of exploitation, data leakage, and unauthorized resource consumption.

AI/LLM technologies are promising and can transform many industries and businesses, offering new innovation and efficiency opportunities. However, the technology represents a huge security challenge at many layers and this impact should not be overlooked. By using Tenable Security Center and Tenable Web App Scanning the organization is able to take a security-first approach. When combined with best practices and robust governance policies, the organizations can harness the power of AI/LLM and mitigate the associated emerging threats.  

This report provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.

Chapters

Executive Summary: This chapter provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). 

AI/LLM Browser Extensions Chapter: This chapter provides the details for Assets that we found to have one or more of the AI/LLM detection browser extension plugins detected by Nessus. The chapter will search through plugins that include certain keywords: GPT, CopIlot, or AI. The AI/LLM Browser Detection chart shows the count of plugins related to the detection of GPT, AI, or Copilot AI or LLM browser extensions. 

AI/LLM Software Detected Using Nessus: This chapter provides the details for Assets that we found to have one or more of the AI/LLM software plugins detected by Nessus. The introductory matrix provides an indicator for all the matches found in the organization, followed by a a chart and table showing the affected assets.

AI/LLM Usage Detected Using Web Application Security: This chapter provides the details for web application assets that we found to have one or more of the AI/LLM detection plugins. The LLM/AI Usage Detected by WAS chart shows the count of plugins related to the detection of AI or LLM. 

 




rep

Rapport 2023 sur les politiques alimentaires mondiales: Repenser les réponses aux crises alimentaires: Synopsis

En 2022, le monde a subi des crises multiples. Les perturbations des systèmes alimentaires dues à la longue pandémie de COVID-19, des catastrophes naturelles majeures, des troubles civils, l’instabilité politique et les impacts croissants du changement climatique ont persisté, tandis qe l’inflation et la guerre entre la Russie et l’Ukraine ont exacerbé la crise alimentaire mondiale et la crise des engrais.




rep

2022 Threat Landscape Report

2022 began with concerns over supply chains and Software Bills of Material (SBOM) as organizations worldwide were forced to reconsider how they respond to incidents in anticipation of the next major event. Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, always at the forefront of trending vulnerabilities and security threats. This dashboard provides a summary of Tenable data that has been compiled over the past year.

In a year marked by hacktivism, ransomware and attacks targeting critical infrastructure in a turbulent macroeconomic environment, organizations struggled to keep pace with the demands on cybersecurity teams and resources. Attacks against critical infrastructure remained a common concern. Ransomware continued to wreak havoc, even as some groups had operations shuttered by law enforcement, collapsed under the weight of internal power struggles, or splintered into new groups. New and complex vulnerabilities emerged, providing remediation challenges.

Perhaps most alarming is that the vulnerabilities of years past continue to haunt organizations. In fact, known flaws were so prominent inn 2022 that they warranted a spot on Tenable’s list of top vulnerabilities of 2022. We cannot stress this enough: Threat actors continue to find success with known and proven exploitable vulnerabilities that organizations have failed to patch or remediate successfully.

The constant evolution of the modern digital environment introduces new challenges for security practitioners. Successful security programs must take a comprehensive approach and understand where the most sensitive data and systems reside and what vulnerabilities or misconfigurations pose the greatest risk. Given the brisk rate of digital transformation, a complete understanding of the external attack surface is paramount.

With thousands of new vulnerabilities patched each year, only a small subset will ever see active exploitation. Focusing resources on the vulnerabilities that are exploitable and understanding how attackers chain vulnerabilities and misconfigurations enables security teams to design comprehensive strategies to reduce their overall risk exposure.

The Tenable 2022 Threat Landscape Report (TLR) inspects key aspects of the cybersecurity landscape and describes how organizations can revise their programs to focus on reducing risk. The TLR covers:

  • Significant vulnerabilities disclosed and exploited throughout the year, including how common cloud misconfigurations can affect even large tech companies
  • The continuous transformation of the ransomware ecosystem and the rise of extortion-only threat groups
  • Ongoing risks, vulnerabilities and attacks within the software supply chain
  • Tactics used by advanced persistent threat groups to target organizations with cyber espionage as well as financially motivated attacks.
  • Breach factors and the challenges in analyzing breach data, given the limited information available and lack of detailed reporting requirements
  • Details of the key vulnerabilities affecting enterprise software

Tenable Research delivers world class cyber exposure intelligence, data science insights, alerts, and security advisories. The Tenable Research teams perform diverse work that builds the foundation of vulnerability management. The Security Response Team (SRT) tracks threat and vulnerability intelligence feeds and provides rapid insight to the Vulnerability Detection team, enabling them to quickly create plugins and tools that expedite vulnerability detection. This fast turnaround enables customers to gain immediate insight into their current risk posture. Tenable Research has released over 180,000 plugins and leads the industry on CVE coverage. Additionally, the SRT provides breakdowns for the latest vulnerabilities on the Tenable Blog and produces an annual Threat Landscape Report. The SRT continuously analyzes the evolving threat landscape, authors white papers, blogs, Cyber Exposure Alerts, and additional communications to provide customers with comprehensive information to evaluate cyber risk.

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.sc discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. The requirements for this dashboard is: Nessus.

Components

TLR 2022 – Top 5 Vulnerabilities:  This component features the top five vulnerabilities of 2022 as described in Tenable's 2022 Threat Landscape Report: Log4shell, Apache Log4j - CVE-2021-44228, Follina, Microsoft Support Diagnostic Tool - CVE-2022-30190, Atlassian Confluence Server and Data Center - CVE-2022-26134, ProxyShell, Microsoft Exchange Server - CVE-2021-34473, and Known Vulnerabilities - CVE-20XX-XXXX.

2022 TLR – Mitigation Tasks:  This component provides a list of patches that mitigate the key vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). The Remediation Summary tool uses the concept of a Patch Chain, and identifies the top patch to be remediated for the greatest risk reduction. When the top patch is applied, all other patches in the chain will be remediated.

2022 TLR – 90 Day Trend Analysis of Key Vulnerabilities: This component provides a 90-day analysis of the most notable vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). There are over 180 CVEs discussed in the TLR, which, combined with the trend line, helps risk managers determine how risk has been reduced over a period of 90 days. The vulnerability last observed filter is set to 1 day to display risk changes on a daily basis.

2022 TLR CVSS to VPR Heat Map: This component provides a correlation between CVSSv3 scores and Vulnerability Priority Rating (VPR) scoring for the key vulnerabilities listed in the 2022 Threat Landscape Report (TLR). The CVSSv3 scores are the standard scoring system used to describe the characteristics and severity of software vulnerabilities. Tenable's VPR helps organizations refine the severity level of vulnerabilities in the environment by leveraging data science analysis and threat modeling based on emerging threats. Each cell is comprised of a combination of cross-mapping of CVSS, VPR scoring, and 2022 CVE identifiers. Using a heat map approach, the filters begin in the left upper corner with vulnerabilities that present least risk.  Moving to the right and lower down the matrix the colors change darker from yellow to red as the risk levels increase.  Tenable recommends that operations teams prioritize remediation for risks in the lower right corners, and then work towards the upper left cells.

2022 TLR – Zero Day Vulnerabilities by Software/Hardware Type: This component displays a list of software/hardware that had zero-day vulnerabilities described in the 2022 Threat Landscape Report (TLR). Each indicator uses CVE from the report through the entire 2022 year. Details are provided in Tenable's 2021 Threat Landscape Report (TLR).

2022 TLR Key Vulnerabilities: This component displays cells for the most significant vulnerabilities of 2022 using CVE filters from the 2022 Threat Landscape Report. These filters display the key vulnerabilities from 2022 as well as the notable legacy vulnerabilities from prior years. Details are provided in Tenable's 2022 Threat Landscape Report.




rep

Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies

Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies

Key steps to strengthen institutions and relationships

The post Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies appeared first on IFPRI.





rep

Donia Human Rights Center Panel Discussion | Reproductive Rights as Human Rights: International Perspectives (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location: Lane Hall
Organized By: Donia Human Rights Center


Payal Shah, JD, Director, Program on Sexual Violence in Conflict Zones, Physicians for Human Rights; Tamara Dávila, Human Rights Fellow at the Arcus Center for Social Justice Leadership in Kalamazoo College, Michigan; Seda Saluk, Assistant Professor, Women’s and Gender Studies, University of Michigan.

Co-sponsored by: U-M Global Feminisms Project, Department of Women's and Gender Studies, Institute for Research on Women and Gender, University of Michigan, and Center for Middle East and North African Studies

This interdisciplinary panel will discuss ongoing efforts around the world to defend reproductive justice as an essential human right, tied to the rights to life, health, equality and autonomy. Speakers will address the role of legal and medical professionals as well as scholars and activists in documenting the harm of restrictions on reproductive rights and advocating for victims with particular focus on the U.S., Nicaragua and Turkey.

This event is free and open to the public, but registration is required if you intend to participate virtually.

Register at: https://myumi.ch/qV9xg

CHAIR:

Professor Michele Heisler, MD, MPA

Professor, Internal Medicine, Health Behavior and Health Equity; Medical Director, Physicians for Human Rights.

Dr. Michele Heisler is renowned for her work in advancing health through respect for human rights and addressing social determinants of health. Internationally recognized for her research on the health consequences of human rights violations, she has authored over 300 peer-reviewed articles and has been instrumental in developing protocols, legislation, and partnerships aimed at preventing violence and discrimination.

PANELISTS:

Payal Shah, JD

Director, Program on Sexual Violence in Conflict Zones, Physicians for Human Rights (participating virtually via Zoom)

Payal Shah, a distinguished human rights lawyer with over 15 years in gender equality and sexual and reproductive rights advocacy, currently directs a major initiative on reproductive rights at Physicians for Human Rights. Her work focuses on training and advocacy to support survivors of sexual violence and improve forensic evidence collection globally.

Tamara Dávila

Human Rights Fellow, Arcus Center for Social Justice Leadership, Kalamazoo College, Michigan

Tamara Dávila, a Nicaraguan psychologist, feminist activist, and human rights defender, has dedicated her career to advocating for sexual and reproductive rights and supporting survivors of violence. Dávila's activism has led to her imprisonment, and she continues her advocacy work from exile in the United States, focusing on empowering marginalized communities.

Seda Saluk, PhD

Assistant Professor, Women’s and Gender Studies, University of Michigan

Feminist anthropologist Seda Saluk specializes in medical anthropology, science and technology studies, and Middle East studies. Her current book project, “Monitoring Reproduction: Surveillance and Care in Turkey”, investigates the complexities of reproductive surveillance against the backdrop of demographic changes. Her research has been widely supported and published in several leading academic journals.

If there is anything we can do to make this event accessible to you, please contact us. Please be aware that advance notice is necessary as some accommodations may require more time for the university to arrange.




rep

Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report

Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report

IFPRI’s 2024 Global Food Policy flagship publication arrives at a pivotal moment, as the importance of addressing food systems for better nutrition continues to gain global recognition. With United Nations Framework Convention on Climate Change (UNFCCC) 29th Conference of the Parties taking place in November, the SUN Global Gathering on the horizon and the Nutrition […]

The post Improving Diets and Nutrition through Food Systems: What Will it Take? A Dialogue on IFPRI’s 2024 Global Food Policy Report appeared first on IFPRI.




rep

Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report

Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report

The livestream will be available on this page November 14, 2024 at 2:30pm (EAT) / 6:30am (EST). Despite significant progress in addressing hunger and undernutrition in the early 2000s, malnutrition, in all its forms, remains a major challenge in all regions of the world. Unhealthy diets remain the primary drivers of many forms of malnutrition, […]

The post Food Systems for Healthy Diets and Nutrition: Africa Regional Launch of IFPRI’s 2024 Global Food Policy Report appeared first on IFPRI.




rep

China Agricultural Sector Development Report 2024 and IFPRI 2024 Global Food Policy Report Launch

Hybrid Event: June 7, 2024 - 9:00 AM to 11:30 AM +08. The China Agricultural Sector Development Report 2024 (CASDR) and IFPRI 2024 Global Food Policy Report (GFPR) hybrid launch event will feature keynote speakers as well as presentations on the overview of the GFPR’s and CASDR’s findings.




rep

Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) 

Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) 

CNBC Africa interviewed John Ulimwengu, IFPRI Senior Research Fellow and the technical editor and lead researcher of the Africa Agriculture Status Report 2023, launched on September 6 at the Africa Food Systems Forum (AGRF). .  The Report titled “Empowering Africa’s Food Systems for the Future” highlights the ways in which Africa is uniquely positioned to redefine its future and […]

The post Unpacking the 2023 Africa agriculture assessment report (CNBC Africa)  appeared first on IFPRI.




rep

The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition

The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition

Washington DC, May 29, 2024: In the face of growing challenges posed by unhealthy diets, all forms of malnutrition, and environmental constraints, the 2024 Global Food Policy Report (GFPR) — released today by the International Food Policy Research Institute (IFPRI) — underscores the importance of transforming complex global food systems to ensure sustainable healthy diets for all. Progress […]

The post The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition appeared first on IFPRI.