aps Insight Works Announces MxAPS 4.7 for Dynamics 365 Business Central: Advanced Scheduling Solutions Reach New Heights By www.24-7pressrelease.com Published On :: Wed, 07 Jun 2023 08:00:00 GMT This update boasts robust new features, reinforcing our commitment to innovation and enhanced user experience in manufacturing and distribution. Full Article
aps Scubapro Jet Fins Revolutionize Underwater Mobility with Enhanced Spring Straps By www.24-7pressrelease.com Published On :: Thu, 27 Apr 2023 08:00:00 GMT Discover the new collection today Full Article
aps MxAPS 4.7 for Business Central: Automated Production Scheduling By www.24-7pressrelease.com Published On :: Thu, 17 Aug 2023 08:00:00 GMT MxAPS 4.7 introduces breakthrough features for automated production scheduling in Microsoft Dynamics 365 Business Central, raising the bar for efficiency and customization. Full Article
aps Colorado Rural Health Center Releases 2024 Snapshot of Rural Health By www.24-7pressrelease.com Published On :: Tue, 13 Feb 2024 08:00:00 GMT Colorado Rural Health Center Snapshot of Rural Health Explores Demographics, Population Health, Chronic Disease, Oral Health, and More Full Article
aps Spark Sourcing Dedicates Staff and Introduces New Packaging Material to Help the Cannabis Industry Reduce Plastic and Avoid Greenwashing Traps By www.24-7pressrelease.com Published On :: Thu, 19 Oct 2023 08:00:00 GMT Eco-shell™ can reduce reduce plastic by up to 50%, carbon by up to 70%, and makes 100% recyclable packaging. Patented, fully certified, and ready to go. Full Article
aps Safencap Unveils Non-Microplastic, Non-Toxic, and Biodegradable Microcapsules By www.24-7pressrelease.com Published On :: Tue, 30 Jan 2024 08:00:00 GMT Groundbreaking achievement by Safencap, an up and coming industry leader Full Article
aps Ravoony – The Best Place To Buy High-Quality Pink Vinyl Car And Truck Wraps At the Best Price By www.24-7pressrelease.com Published On :: Sun, 18 Jun 2023 08:00:00 GMT Ravoony is a leading paint protecting, car wrap, and truck wrap manufacturer from China that is popular for its high quality, bestselling, and affordably priced pink vinyl truck and car wraps. Full Article
aps Atlantis Exchange Launches AtlantisDEX for Instant Multi-Chain Swaps of Millions of Cryptocurrencies By www.24-7pressrelease.com Published On :: Thu, 26 Sep 2024 08:00:00 GMT AtlantisDEX's high-performance, cost-effective cross-chain solutions open a new era of decentralized trading! Full Article
aps The VC Fund Closing Equity Gaps — and Making Money By hbr.org Published On :: Tue, 08 Aug 2023 08:00:53 -0500 Much of the business world has bought into the idea of stakeholder capitalism. But Freada Kapor Klein and Mitch Kapor say that doing some good by doing well isn’t enough when the business impact still creates negative effects and broader disparities overall. Freada, with a background in social justice and empirical research, and Mitch, an entrepreneur and investor who got his start making early spreadsheet software, strive to invest in ventures that close the distance between those with wealth and privilege and those without. The founders explain their metrics and decision-making process at Kapor Capital. The profitable firm explicitly invests in tech startups serving low-income and underrepresented communities. Freada and Mitch wrote the book Closing the Equity Gap: Creating Wealth and Fostering Justice in Startup Investing. Full Article
aps Court Upholds Award for Worker's Collapsed Lung By ww3.workcompcentral.com Published On :: Wed, 23 Oct 2024 00:00:00 -0700 A New York appellate court ruled that a worker was entitled to benefits for a collapsed lung from an on-the-job exposure. Case: Matter of Bonitto v. Vivid Mechanical LLC, No. CV-23-0192,… Full Article
aps International research challenge to tackle knowledge gaps in women’s cardiovascular health By newsroom.heart.org Published On :: Wed, 25 Sep 2024 13:00:00 GMT DALLAS, Sept. 25, 2024 — The American Heart Association, celebrating 100 years of lifesaving service as the world’s leading nonprofit organization focused on heart and brain health for all, is joining with other top cardiovascular research funders around... Full Article
aps Understanding cardiac arrest and emergency response following Damar Hamlin’s collapse during Monday Night Football By newsroom.heart.org Published On :: Tue, 03 Jan 2023 18:30:00 GMT DALLAS, January 3, 2023 —While playing in the Buffalo Bills - Cincinnati Bengals game on Monday Night Football on January 2, Bills player Damar Hamlin suffered a cardiac arrest after a hit and was administered CPR on the field before being transferred to... Full Article
aps Early wayfinding maps By www.designworkplan.com Published On :: 2021-03-30T00:00:00Z A unique ancient map of the Mesopotamian world. Babylonian, about 700-500 BC. Image courtesy of The British Museum. Early wayfinding map Early map creating represents a significant step forward in the intellectual development of knowledge for the human race. The information and maps were used as tools and could be passed on from one generation to another. Early maps are not geographical correct, but maps to capture the observers spatial knowledge of a space as a cognitive map. These maps contained the characteristics of that particular space and that could be remembered by humans, such as paths, landmarks, nodes, mountains, sea and areas. One of the oldest maps of the Mesopotamian World dates back to around 500-700 BC. This is a unique ancient carved tablet that contains a cuneiform inscription (early written expression) and Babylon is drawn in the middle. Also, other places are mentioned such as Assyria and Elam. Around the centre is a circular waterway described as 'Salt-Sea' and the outer rim of the sea is surrounded with about eight regions. The regions contained marked signs or are labeled with names as 'Region' or 'Island', interestingly the distances are marked between the regions. Over time maps became increasingly accurate and a universal tool for communication. Regardless of language or culture maps are mostly easy to understand by most people. By the use of scientific tools such as a compass rose, maps would improve as navigation tool. The compass rose was invented around the same time as the Polynesian explorers went on their Voyages. But made it appearances not earlier that the 11th century on maps and charts for a sense of orientation and direction. The knowledge of aiming The Babylonian Map shows a clear image of where destinations are located. Although the reading of the tablet is illegible, we can clearly make out the direction of destinations. If you would follow the euphrates towards the mountains other destinations will become able to locate. Similar to the Pythagorean Theorem, if you know two elements you can hypotenuse the third element. In this case identifying two locations makes the observer able to set a path to the desired location. Landmark wayfinding The usage of landmarks to navigate originates from the tablet and is still used today for orientation and navigational purposes. As we browse through history landmark maps are commonly used to indicate destinations and have a reference of landmark buildings. Example of the Roman Empire a landmark map, an abstract map of Europe showing cities, Middle Sea, Middle East and parts of Middle Europe. The landmarks are placed on top of the map as a 3D landmark. This map dates from the high days of the Roman Empire. Image taken from Erroma. The Image of the City (Kevin A. Lynch) Kevin Lynch published the book The Image of the City (1960) and described a way for people to mentally map and understand their environments in a logical and predictable way. In his book he describes a the concept of mental maps, a sketch map by a average person about an environment from memory. Within the mental maps he discovered five common elements to indicate whereabouts, destinations and paths. Similar to the early maps. Pathways, streets, sidewalks, trails, and other channels in which people travel; Edges, perceived boundaries such as walls, buildings, and shorelines; Districts, which represent relatively large sections of the city distinguished by some identity or character; Nodes, focal points, intersections, decision points or gateways Landmarks, memorable/identifiable objects or places which serve as external reference points. People who move through the city engage in way-finding. They need to be able to recognize and organize urban elements into a coherent pattern. ~Kevin Lynch Main takeaways A mental map is one of the most important human elements to 'read' an (un)familiar environments. In order to orientate and navigate we tend to use references from our surroundings and interpret elements to choose the desired path. A mental map is the human imagination of reality, a map that is different for everyone. According to the mental map we can estimate where other places are places and how we can go. This is our association with the environment, perception and appreciation of this environment. Full Article
aps MapSVG By welovewp.com Published On :: Wed, 14 Oct 2020 17:40:16 +0000 MapSVG is a WordPress map plugin that helps you create custom content (people, real estate, events, or anything else) and show it on a vector, image, or Google Maps – with filters and search. Full Article Resource WordPress Gallery Clean Flat Design Responsive WordPress Plugins
aps Timelapse Unveils the Sky Vault over the Joshua Tree National Park By www.fubiz.net Published On :: Sat, 07 Jan 2023 12:18:44 +0000 Le court métrage “Moonlight Mojave” est un sublime timelapse pris dans le parc national de Joshua Tree, dans un paysage nocturne. Un ciel étoilé hypnotique se déploie au dessus du désert que la lune et les étoiles illuminent comme si c’était le jour. Le film fait partie du projet Skyglow, qui veut sensibiliser au problème […] Full Article Nature Photography User Featured nature
aps Greenland Mountaintop Collapse Triggered Mega Tsunami & 9-Day Seismic Event By www.labroots.com Published On :: Fri, 20 Sep 2024 12:00:00 -0700 An image by the Danish army shows the site after the landslide and subsequent mega-tsunami. Full Article Earth & The Environment
aps Greenland Mountaintop Collapse Triggered Mega Tsunami & 9-Day Seismic Event By www.labroots.com Published On :: Fri, 20 Sep 2024 12:00:00 -0700 An image by the Danish army shows the site after the landslide and subsequent mega-tsunami. Full Article Technology
aps Use Of Google Maps. By www.ukoln.ac.uk Published On :: As an example of embedding a Web 2.0 service in a Web site we are pleased to announce that a Google Map has been embedded in the IWMW 2006 Web site. [2006-05-18] Full Article
aps A6: Mashups: More than Maps By www.ukoln.ac.uk Published On :: 2008-07-22 Distributed computing - where data is consumed from external Web sites, sometimes 'mashed', or displayed in some other way on your own site, has become a powerful way of providing functionality, and requires little or no financial outlay or technical understanding. This workshop will look at some of the services available and examine some of the ways that they can be combined or otherwise used on your site and for prototype development. The session was facilitated by Mike Ellis, Eduserv. Full Article
aps What’s Golf Got to Do with It? Linking Fairway Sand Traps to Workplace Equity Gaps By www.littler.com Published On :: Wed, 30 Mar 2022 15:08:29 +0000 Golf is one of the most significant informal business networks and approximately half of all women feel like their exclusion from these gateways is among the key challenges to reaching the highest echelons of corporate leadership. As a prelude to the 2022 edition of the “Masters Season,” Littler Principal Cindy-Ann Thomas explores how enduring barriers in recreational golf impact meaningful access and equity gains for women in corporate America. Full Article
aps D.C.’s Pay Transparency Law Aims to Close Severe Gaps By www.littler.com Published On :: Mon, 05 Feb 2024 22:15:57 +0000 As Washington, D.C., prepares to join a growing group of state and local jurisdictions requiring pay transparency in job postings and recruiting practices, Joy Rosenquist comments on how the D.C. law is different. WorldatWork View Full Article
aps German firms not required to pay “to the top” for gender pay gaps By www.littler.com Published On :: Thu, 07 Nov 2024 14:39:14 +0000 Sabine Vianden discusses the German Pay Transparency Act and how it can help solve the gender pay gap discrepancies in Germany. International Employment Lawyer View (Subscription required) Full Article
aps Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates By www.tenable.com Published On :: Fri, 25 Oct 2024 09:00:00 -0400 Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.Dive into six things that are top of mind for the week ending Oct. 25.1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.The white paper covers shadow AI topics including:Creating a comprehensive inventory of AI systemsConducting gap analyses to spot discrepancies between approved and actual AI usageImplementing ways to detect unauthorized AI waresEstablishing effective access controlsDeploying monitoring techniques “By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:The asset’s descriptionInformation about its AI modelsInformation about its data sets and data sourcesInformation about the tools used for its development and deploymentDetailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standardsRecords of its access control mechanismsShadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.To get more details, read:The full “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paperA complementary slide presentationThe CSA blog “Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape”For more information about AI security issues, including shadow AI, check out these Tenable blogs:“Do You Think You Have No AI Exposures? Think Again”“Securing the AI Attack Surface: Separating the Unknown from the Well Understood”“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach”“6 Best Practices for Implementing AI Securely and Ethically”“Compromising Microsoft's AI Healthcare Chatbot Service”2 - Best practices for secure software updatesThe security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.”“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.To get more details, read:The “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers” guideThe CISA alert “CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes”For more information about secure software updates:“Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design” (Tenable)“The critical importance of robust release processes” (Cloud Native Computing Foundation)“Software Deployment Security: Risks and Best Practices” (DevOps.com)“Software Updates, A Double-Edged Sword for Cybersecurity Professionals” (Infosecurity)“DevOps Best Practices for Faster and More Reliable Software Delivery” (DevOps.com)3 - Report: GenAI, attack variety, data security drive cyber strategiesWhat issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.To get more details, read:The report’s announcement “Cybersecurity success hinges on full organizational support, new CompTIA report asserts”CompTIA’s blogs “Today’s top drivers for cybersecurity strategy” and “Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report”The full “State of Cybersecurity 2025” reportFor more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” (on-demand webinar)“The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy” (blog)“Mitigating AI-Related Security Risks” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)4 - CISA lists software dev practices most harmful for securityRecommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added. Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:Using programming languages considered “memory unsafe”Including user-provided input in SQL query stringsReleasing a product with default passwordsReleasing a product with known and exploited vulnerabilitiesNot using multi-factor authenticationFailing to disclose vulnerabilities in a timely mannerAlthough the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.To get more details, check out:CISA’s announcement “CISA and FBI Release Product Security Bad Practices for Public Comment”The full document “Product Security Bad Practices”For more information about how to develop secure software:“Tenable Partners with CISA to Enhance Secure By Design Practices” (Tenable)“Ensuring Application Security from Design to Operation with DevSecOps” (DevOps.com)“What is application security?” (TechTarget)“Guidelines for Software Development (Australian Cyber Security Centre)5 - New EU law focuses on cybersecurity of connected digital productsMakers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars. For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:Aren’t shipped with known exploitable vulnerabilitiesFeature a “secure by default” configurationCan fix their vulnerabilities via automatic software updatesOffer access protection via control mechanisms, such as authentication and identity managementProtect the data they store, transmit and process using, for example, at-rest and in-transit encryption“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.For more information and analysis about the EU’s Cyber Resilience Act:“Cyber Resilience Act Requirements Standards Mapping” (ENISA)“The Cyber Resilience Act, an Accidental European Alien Torts Statute?” (Lawfare)“EU Cybersecurity Regulation Adopted, Impacts Connected Products” (National Law Review)“Open source foundations unite on common standards for EU’s Cyber Resilience Act” (TechCrunch)“The Cyber Resilience Act: A New Era for Mobile App Developers” (DevOps.com)VIDEOThe EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 6 - UK cyber agency: CISOs must communicate better with boardsCISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.”As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.”“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.Here’s a small sampling of the advice:Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.Aim to provide a holistic view, and avoid using technical jargon.Aim to advise instead of to educate. Full Article
aps Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
aps Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources By www.tenable.com Published On :: Fri, 08 Nov 2024 09:00:00 -0500 CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.Dive into six things that are top of mind for the week ending Nov. 8.1 - CISA: Beware of nasty spear-phishing campaignProactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads. Other CISA recommendations include:Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFAEducate users on how to spot suspicious emailsHunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and proceduresAlthough CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.”For more information about securing RDP tools:“Commonly Exploited Protocols: Remote Desktop Protocol (RDP)” (Center for Internet Security)“What is remote desktop protocol (RDP)?” (TechTarget)“Wondering Whether RDP IS Secure? Here's a Guide to Remote Desktop Protocol” (AllBusiness)“Why remote desktop tools are facing an onslaught of cyber threats” (ITPro)“'Midnight Blizzard' Targets Networks With Signed RDP Files” (Dark Reading)2 - OWASP issues AI security resourcesHow should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project. The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.These are the new resources:“The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:preparationdetection and analysiscontainment eradication and recoverypost-incident activity“The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:Generative AI security policiesRisk assessment and management processesTraining and awarenessResearch and development“The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”For more information about protecting your organization against deepfakes:“How to prevent deepfakes in the era of generative AI” (TechTarget)“Deepfake scams escalate, hitting more than half of businesses” (Cybersecurity Dive)“The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks” (SecurityWeek)“How deepfakes threaten biometric security controls” (TechTarget)“Deepfakes break through as business threat” (CSO)3 - Fake update variants dominate list of top malware in Q3Hackers are doubling down on fake software-update attacks.That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.Here’s the full list, in descending order:SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updatesClearFake, another JavaScript downloader used for fake browser-update attacksZPHP, another JavaScript downloader used for fake software-update attacksAgent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshotsCoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functionsMirai, a malware botnet that compromises IoT devices to launch DDoS attacksNanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheetLumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking informationTo get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.For details on fake update attacks:“Fake browser updates spread updated WarmCookie malware” (BleepingComputer)“Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware” (The Hacker News)“Hackers Use Fake Browser Updates for AMOS Malware Attacks Targeting Mac Users” (MSSP Alert)“Malware crooks find an in with fake browser updates, in case real ones weren't bad enough” (The Register)“Fake Google Chrome errors trick you into running malicious PowerShell scripts” (BleepingComputer)VIDEOFake Chrome Update Malware (The PC Security Channel)4 - CISA’s first international plan unveiledCISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructureBoost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreatsUnify the coordination of international activities to strengthen cyberdefenses collectivelyThe plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.5 - Interpol hits phishers, ransomware gangs, info stealersInterpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.For more information about global cybercrime trends:“AI-Powered Cybercrime Cartels on the Rise in Asia” (Dark Reading)“AI Now a Staple in Phishing Kits Sold to Hackers” (MSSP Alert)“The Business of Cybercrime Explodes” (BankDirector)“Nation state actors increasingly hide behind cybercriminal tactics and malware” (CSO)6 - IST: Ransomware attacks surged in 2023Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. “Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.Global Ransomware Incidents in 2023Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.To learn more about ransomware trends:“Ransomware Is ‘More Brutal’ Than Ever in 2024” (Wired)“Ransomware on track for record profits, even as fewer victims pay” (SC Magazine)“How Can I Protect Against Ransomware?” (CISA)“How to prevent ransomware in 6 steps” (TechTarget)“Steps to Help Prevent & Limit the Impact of Ransomware” (Center for Internet Security) Full Article
aps Multi-tiered chemical proteomic maps of tryptoline acrylamide–protein interactions in cancer cells - Nature.com By news.google.com Published On :: Tue, 13 Aug 2024 07:00:00 GMT Multi-tiered chemical proteomic maps of tryptoline acrylamide–protein interactions in cancer cells Nature.com Full Article
aps Pareto Charts in Quality Control: A Snapshot By www.qualitymag.com Published On :: Fri, 06 Oct 2023 00:00:00 -0400 Pareto charts provide clarity and direction, helping quality control departments target and resolve key challenges. Full Article
aps Nearly Two Million Manufacturing Jobs May Remain Unfilled due to Skill Gaps By www.qualitymag.com Published On :: Mon, 21 Oct 2024 00:00:00 -0400 American manufacturing is making a comeback, fueled by billions in investments and new technologies. This reshoring not only boosts job quality and economic opportunity but also mitigates supply chain risks exposed during the COVID-19 pandemic. But is there a catch? Full Article
aps Oil Traps Protect the Compressor By www.achrnews.com Published On :: Fri, 08 Apr 2022 07:00:00 -0400 Even though the circulated refrigerant is the working fluid required for cooling, lubricant or oil is needed for lubrication of the compressor’s moving mechanical parts. Full Article
aps TNFR Wraps Up Contractor Training and Strategizing Event By www.achrnews.com Published On :: Fri, 27 Oct 2023 16:00:10 -0400 Business Uncensored partnered with Service World Expo to provide a joint event for contractors pursuing excellence in their local markets. Full Article
aps Episode 399: Sumit Kumar on Building Maps using Leaflet By traffic.libsyn.com Published On :: Thu, 20 Feb 2020 22:12:50 +0000 Sumit Kumar, Head of Engineering at SHARE NOW talks with Jeremy Jung about creating mapping applications in JavaScript using the Leaflet library. Full Article
aps Thursday Night Budget Passage Wraps Up Busy Week at the PA Capitol By www.pacatholic.org Published On :: Fri, 12 Jul 2024 14:42:31 +0000 It was a week of long days and late nights at the PA Capitol in Harrisburg. The House and Senate passed a $47.6-billiion budget Thursday night and the Governor quickly signed it. Here are some of the highlights from the week as we posted on Facebook. https://www.facebook.com/share/v/jB4x3LorzSqsLGGH/?mibextid=WC7FNe https://www.facebook.com/share/v/e6znUQoeEmS8bEVb/?mibextid=WC7FNe https://www.facebook.com/share/v/xRefuvWNigC7J8Yr/?mibextid=WC7FNe https://www.facebook.com/share/v/3XkX2ARAsyAwBKq4/?mibextid=WC7FNe https://www.facebook.com/share/v/7UMepHi21UzpeVFP/?mibextid=WC7FNe https://www.facebook.com/share/v/xWuE2TTU16vzTbGr/?mibextid=WC7FNe https://www.facebook.com/share/v/VhN9DPhZXAQfNshK/?mibextid=WC7FNe https://www.facebook.com/share/v/TjJfE13g46cUwRSt/?mibextid=WC7FNe https://www.facebook.com/share/v/zSvyP6CHK366W8hp/?mibextid=WC7FNe Full Article Faith + Politics Homepage Feature Homepage Posts
aps Bisisthal: a one million tonne rock slope collapse in Switzerland By blogs.agu.org Published On :: Wed, 02 Aug 2023 07:18:22 +0000 On 30 July 2023 a one million tonne rock slope collapse occurred close to Bisisthal in Switzerland. It was captured on several videos, which show the initial pillar collapses and the transition to a rapid rock avalanche. Full Article landslide report Europe featured pillar rock avalanche rockslope Switzerland youtube
aps SnapSlide Unveils Child-Resistant Closure with Single-Hand Operation for Rx Vials By www.packagingstrategies.com Published On :: Tue, 23 Apr 2024 00:00:00 -0400 The patented solution brings life-changing potential for over 60 million Americans with physical limitations, while also reducing plastic usage. Full Article
aps LINDAL Group and APS Collaborate to Create miniMist By www.packagingstrategies.com Published On :: Thu, 25 Feb 2021 07:00:00 -0500 miniMist is a dispensing system designed to offer a reusable and sustainable alternative to the existing aerosol format. Full Article
aps Graduation Caps, Gowns Made of Recycled Coca-Cola Bottles By www.packagingstrategies.com Published On :: Wed, 01 May 2019 00:00:00 -0400 Graduates of the 2020 high school class in Atlanta, Georgia, are going to be wearing their graduation garb made of recycled plastic bottles. Coca-Cola began collecting plastic bottles at its headquarters as part of Earth Day activities. The goal is to gather 7,000 bottles, enough to make graduation outfits for 200 graduates. Full Article
aps Bayer and Liveo Launch PET Blister Packaging for Aleve Capsules By www.packagingstrategies.com Published On :: Wed, 30 Oct 2024 11:28:16 -0400 This innovative solution reduces the carbon footprint of the packaging by 38% and marks a stride in environmental stewardship by eliminating the use of polyvinyl chloride (PVC) in their portfolio. Full Article
aps Amcor Capsules touts recycled tin in capsules for wine, spirits and sparkling foils By www.packagingstrategies.com Published On :: Wed, 08 May 2024 00:00:00 -0400 The strategic move away from primary content and toward recycled tin helps Amcor Capsules deliver its vision for a more responsible wine and spirits packaging industry. Full Article
aps Amcor Capsules, Moët & Chandon to launch plastic-free aluminum/paper foil By www.packagingstrategies.com Published On :: Tue, 04 Jun 2024 00:00:00 -0400 Initially, the solution will only be available with texturing to allow sparkling wine players to retain the premium look of their bottles. The ESSENTIELLE foil with a smooth finish will be available during the first quarter of 2025. Full Article
aps No Caps On Innovation By www.packagingstrategies.com Published On :: Mon, 17 Jun 2024 00:00:00 -0400 Packaging Strategies has extensively covered recent innovations in caps and closures, each distinctly unique in materials, applications, and specific benefits. Full Article
aps Sustainability Beyond the Carton: Caps & Straws By www.packagingstrategies.com Published On :: Mon, 24 Jun 2024 00:00:00 -0400 Babitha George, a representative from Tetra Pak, delves into the topic of driving progress toward a sustainable future by introducing innovative designs for straws and caps. Full Article
aps Harvest Snaps rebrands Selects to Crunchy Puffs By www.packagingstrategies.com Published On :: Thu, 07 Mar 2024 00:00:00 -0500 The brand is undergoing a packaging redesign for its three Harvest Snaps flavors: Honey Dijon, Loaded Taco, and White Cheddar Jalapeno. Full Article
aps Filling The Labour Gaps The Key To A Thriving Tourism Industry In Canada By destinationsinternational.org Published On :: Wed, 30 Oct 2024 15:35:42 +0000 Filling The Labour Gaps The Key To A Thriving Tourism Industry In Canada jhammond@desti… Wed, 10/30/2024 - 15:35 Image Off At a time when Canadian youth, newcomers, and members of underrepresented communities face record levels of unemployment, our sector is presented with a unique opportunity. We have a chance to transform our workforce, improve the quality of life of every Canadian, and make a positive impact that goes beyond an economic contribution. We must promote the rewarding and long-term career paths the tourism sector provides to attract and retain the next generation of Canada’s talented workforce. Nik Mills 4 min read October 30, 2024 Tourism is, at its core, about people. It’s powered by the connections we make, the stories we share, and the experiences we create together. From the dedicated hospitality workers who welcome travellers with warmth, to the local artisans and guides who bring our culture to life, it’s the people behind the scenes who truly make tourism thrive. Every journey is enriched by the unique contributions of individuals who are passionate about showcasing their communities and welcoming visitors from around the world. Employment in the tourism sector remains lower than it was before the pandemic. According to the most recent annual data, employment levels for several advanced career positions in tourism and hospitality are dramatically lower than in 2019. Air traffic controllers are down 33 per cent, executive housekeepers and hospitality workers are down 31 per cent, and for conference and event planners, employment is down 19 per cent. At a time when Canadian youth, newcomers, and members of underrepresented communities face record levels of unemployment, our sector is presented with a unique opportunity. We have a chance to transform our workforce, improve the quality of life of every Canadian, and make a positive impact that goes beyond an economic contribution. We must promote the rewarding and long-term career paths the tourism sector provides to attract and retain the next generation of Canada’s talented workforce. As an industry, we must plug the gaps that hamper productivity and threaten to damage Canada’s reputation as a tourism destination. Strategic public investment is required to promote tourism as a vocation and enhance its labour force with talent. This is best achieved through meaningful partnerships—not only within our sector but with the federal government. These partnerships will be the cornerstone of our industry’s success. To this end, TIAC is working with Restaurants Canada, the Hotel Association of Canada, and Tourism HR Canada to call on the federal government to fund a national marketing campaign through a three-year, $5-million investment. This campaign promotes tourism as a career among young Canadians. It builds on the work that THRC has initiated with its Discover Tourism program, which provides valuable career planning, curriculum, and HR tools to job seekers, employers, and educators. The logic underpinning this program presupposes that today’s youth are unaware of the career possibilities the tourism industry presents and the satisfaction that comes from showcasing Canada to its visitors. Nascent workers, read about the Discover Tourism program and take advantage of the resources available to you. Careers in tourism are varied and fulfilling; your perusal of these programs could lead you to your dream job. While we build our future workforce, we must leverage existing industry supports and government programs such as THRC’s Ready to Work program, which helps businesses recruit job seekers and integrate newcomers into a career in tourism. Its internships—a composite of in-class education and workplace training—facilitate job-readiness and career planning. Over the years, it has provided under-represented communities with career options and growth opportunities in the tourism sector by providing them access to certification programs (e.g., WHMIS, CPR, responsible alcohol service) that will open up new pathways in their pursuit of employment. The Economic Mobility Pathways Pilot is an express-entry program that pairs employers with skilled newcomers, asylum seekers, and refugees to Canada. Such opportunities enable these individuals to flourish and ensure their new lives an auspicious start. It also makes available to employers qualified candidates whose background and education could provide unique skillsets and perspectives. Even without a firm job offer, talented refugees may nevertheless gain entry into Canada and begin their new life, with employment opportunities coming as they settle into the country. Tourism operators suffering from the labour gap are encouraged to take advantage of this program that is mutually beneficial for themselves and those skilled workers who hope to call Canada home. As global demand for tourism rises, Canada must remain a top-tier destination. To do so, the fundamental needs of the sector must be met for it to thrive in the years ahead. By investing in our people and forging strong and reliable partnerships, we can ensure that Canada’s tourism industry does not just survive, but truly flourishes. Together, we can build a future that benefits our economy, our communities, and everyone involved in this wonderful sector. About the Author Nik Mills Director, Policy & Government Affairs, Tourism Industry Association of Canada As Director, Policy and Government Affairs with the Tourism Industry Association of Canada, Nik develops policy, research and government relations initiatives that support TIAC’s vision to lead the Canadian tourism industry to be one of the most competitive in the world. With extensive experience in the industry, Nik has successfully led advocacy-based consulting projects supporting job creation and economic recovery strategies for various tourism organizations. Nik studied political economy, communications, and innovation policy at Toronto Metropolitan University, York University, and the University of New Brunswick. chevron_right More from this Author Submit Your Thought Leadership Share your thought leadership with the Destinations International team! Learn how to submit a case study, blog or other piece of content to DI. Submit to DI Organizational Resilience & Growth Workforce Development Show Header? On Full Article
About the Author Nik Mills Director, Policy & Government Affairs, Tourism Industry Association of Canada As Director, Policy and Government Affairs with the Tourism Industry Association of Canada, Nik develops policy, research and government relations initiatives that support TIAC’s vision to lead the Canadian tourism industry to be one of the most competitive in the world. With extensive experience in the industry, Nik has successfully led advocacy-based consulting projects supporting job creation and economic recovery strategies for various tourism organizations. Nik studied political economy, communications, and innovation policy at Toronto Metropolitan University, York University, and the University of New Brunswick. chevron_right More from this Author
aps DULOXECOR duloxetine hydrochloride 30 mg enteric capsule blister pack (duloxetine hydrochloride) By apps.tga.gov.au Published On :: Unexpected increase in consumer demand Full Article
aps TACROGRAF tacrolimus 1 mg capsule bottle (tacrolimus monohydrate) By apps.tga.gov.au Published On :: Manufacturing Full Article
aps TACIDINE nizatidine 300mg capsule blister pack (nizatidine) By apps.tga.gov.au Published On :: Unexpected increase in demand due to other sponsors unable to supply Full Article
aps NUPENTIN 300 gabapentin 300 mg capsule blister pack (gabapentin) By apps.tga.gov.au Published On :: Manufacturing Full Article
aps DUODART 500/400 dutasteride 500 microgram and tamsulosin hydrochloride 400 microgram modified release capsule bottle (tamsulosin hydrochloride) By apps.tga.gov.au Published On :: Manufacturing Full Article
aps DUODART 500/400 dutasteride 500 microgram and tamsulosin hydrochloride 400 microgram modified release capsule bottle (dutasteride) By apps.tga.gov.au Published On :: Manufacturing Full Article
aps MOXICAM meloxicam 15 mg capsule blister pack (meloxicam) By apps.tga.gov.au Published On :: Manufacturing Full Article