spot

The Global Beauty Awards to Spotlight Excellence In Pageantry In April

The Oscars Of Pageantry




spot

Pop Star Jasmine Ortiz Shines The Spotlight On Colombia With Her Next Single "En La Disco" and Tour

"En La Disco" Produced by Multi-Platinum Producer SOG, the most sought-after Producer in Colombia!




spot

Go For The New Version Of MuConverter Spotify Music Converter: 30-Day Free Trial With 5X Faster Batch Saving & All-Device Streaming

When music can transform your mode or any ambiance with its melody & magic, the new version of MuConverter Spotify Music Converter is set to give you a revolutionary experience in your offline listening.




spot

UkeySoft Spotify Music Converter & Apple Music Converter: Multi-Format, Batch Conversion, ID3 Tags & More To Explore

Do you want to convert Spotify Music and Apple Music to MP3 for listening offline? Try the professional UkeySoft Spotify Music Converter and Apple Music Converter, which can make all Apple Music tracks and Spotify songs playable on any devices.




spot

PepperBall To Spotlight New Non-Lethal Products at IACP 2024

Innovating Non-lethal De-escalation, Booth 1031, Oct. 19-22




spot

DFW Elite Toy Museum's "Robots and Space Toys" Exhibit Spotlights Gort and Life-Sized Red Rocker from Rock 'Em Sock 'Em Robots

Part of the museum's special collection, these unusual and storied robots offer a rare opportunity to experience a pair of marvelous mid-20th-century robot toys.




spot

Past Lane Travels Shines a Spotlight on America's Best Historic Small Towns

Top historical travel site unveils its exclusive list of small towns every history lover should visit.




spot

These Stocks Are Moving the Most Today: Tesla, Rivian, Spirit Airlines, Spotify, Cava, Rocket Lab, and More




spot

Spot AI debuts Video AI Agents, transforming camera footage into a proactive, valuable data source

By infusing cameras with advanced AI technology, Video AI Agents enable cameras to identify, reason, and trigger responses to real-life incidents without requiring human intervention




spot

Exclaimer?s integration with HubSpot transforms email signatures into powerful marketing opportunities

This integration centers on the strategic marketing opportunities associated with email signatures, enabling marketers to deliver personalized, data-driven communication that improves contact relationships and engagement




spot

FOB Kitchen, Great New Filipino Hot Spot in Oakland, California

I had the pleasure to try FOB Kitchen last night, a hot new Telegraph Avenue Oakland Filipino menu in Oakland (Thanks cristina_thebaker!). 5179 Telegraph Ave, Oakland, CA 94609. You would not know it from the unassuming Temescal strip mall setting, but once inside you are treated to an amazing and flavorful Filipino menu from this …




spot

August GNU Spotlight with Amin Bandali

Fifteen new GNU releases in the last month (as of August 31, 2024):




spot

September GNU spotlight with Amin Bandali

Fourteen new GNU releases in the last month (as of September 30, 2024):




spot

October GNU Spotlight with Amin Bandali: Seven new GNU releases!

Seven new GNU releases in the last month (as of October 31, 2024):




spot

AI in Hiring In-House Lawyer Blind Spot, Survey Says

Niloy Ray discusses findings in Littler’s AI C-Suite Survey Report that reveal an awareness gap between legal chiefs and HR regarding whether their company is using AI tools.

Bloomberg Law 

View (Subscription required)




spot

Spotlight on Positive Employee Relations Training: How Employers Can Reap the Benefits of Employee Engagement

In this podcast, Littler attorneys Michael Kessel, Russ McEwan and Alan Model, out of our Newark office, discuss the importance of cultivating “employee engagement” to foster a productive, invested workforce. They also describe the new Littler Positive Employee Relations Series, which offers customized, intensive training to supervisors on the causes of negative morale and then arms them with practical tools to spot and handle problems before they get out of hand.
 




spot

Spotting and Solving Workplace Issues Before They Lead to Legal Troubles




spot

Alumni Spotlight — Meet Erin Webber

Erin Webber talks about how her father inspired her future career in labor and employment law and recalls her journey to become the Managing Director of Littler. 

MIZZOU Magazine

View




spot

SpotOn London 2012 Storify: eBooks and apps

Here is a Storify round up of the SpotOn London session: Enhanced eBooks & BookApps: The




spot

SpotOn London 2012 Storify: Collaborating and building your online presence: educating scientists and science students

Jenny Evans has created a Storify summary of her SpotOn London session: Collaborating and building your online




spot

SpotOn London 2012 Storify: BrainSpace, a global interest graph for scientists

Here is a Storify summary of the SpotOn London session: BrainSpace, a global interest graph for




spot

Share your experiences to create some SpotOn social media tips for scientists!

It ain’t a party if you can’t join us Towards the end of April, SpotOn




spot

SpotOn London 2013 – draft programme: Tools track

This year, Digital Science are sponsoring the Tools track and we’re grateful to them for




spot

SpotOn London 2013: What should the scientific record look like in the digital age?

Julia Schölermann is the organiser for this year’s SpotOn London session on, What should the scientific




spot

SpotOn London 2013: How are online tools changing science education?

The place we’re in as a society is a crowded field of scattered tools and




spot

SpotOn London Storify: Wikipedia editing session

Here is a Storify collecting the online conversations from the Wikipedia editing workshop at this year’s




spot

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




spot

SpotOn London 2012 Storify: Fixing the fraud: how do we safeguard science from misconduct?

#solo12fraud




spot

SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber?

Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits.




spot

SpotOn London 2012: My not-so-secret-anymore double life: Juggling research and science communication

Dr Anne Osterrieder is a Research and Science Communication Fellow in Plant Cell Biology at the Department of




spot

SpotOn London 2012 Storify: Incentivising Open Access and Open Science: Carrot and Stick

Here is a Storify round up of the SpotOn London session: Incentivising Open Access and Open




spot

SpotOn London 2012 Storify: ORCID – why do we need a unique researcher ID?

Here is a Storify round up of the SpotOn London session: ORCID – why do we




spot

SpotOn London 2012 Storify: What do you need to start a revolution?

Here is a Storify round up of the SpotOn London session: What do you need to




spot

SpotOn London 2012 Storify: Tackling the terabyte: how should research adapt to the era of big data?

Here is a Storify round up of the SpotOn London session: Tackling the terabyte: how should




spot

SpotOn London 2013 – draft programme: Policy track

As we’re getting ready to make tickets available for this year’s SpotOn London conference, we’re




spot

SpotOn London 2013: Altmetrics – The Opportunities and the Challenges

Marie Boran is a PhD candidate at the INSIGHT Centre for Data Analytics, the National




spot

SpotOn London 2013: Contract for interdisciplinary working

In preparation for this year’s SpotOn London 2013 workshop, Interdisciplinary research: what can scientists, humanists




spot

SpotOn London 2013 – draft programme: Outreach track

As we’re getting ready to make tickets available for this year’s SpotOn London conference, we’re




spot

SpotOn London 2013: Public Health Links, Lost in Translation

Damian Pattinson (@damianpattinson) is a co-organiser of the session on Public Health Links, Lost in Translation at




spot

SpotOn London 2013 Storify: Open, Portable, Decoupled – How should Peer Review change?

Here is a Storify collating the online conversation around the Open, Portable, Decoupled – How should




spot

SpotOn London 2013 Storify: Science games: does play work?

Here is a Storify collecting the online conversations from the Science games: does play work? session at




spot

SpotOn London Storify: Communicating Science in an Open Access World

Here is a Storify collecting the online conversations from the Communicating Science in an Open Access




spot

SpotOn London 2013 Storify: The Dark Art of Dark Social: Email, the antisocial medium which will not die

Here is a Storify collecting the online conversations from the, “The Dark Art of Dark




spot

SpotOn London Storify: How are online tools changing science education?

Here is a Storify collecting the online conversations from the “How are online tools changing




spot

How to get a ticket for this year’s SpotOn London

With a month to go, we’ve been busy behind the scenes planning for this year’s




spot

SpotOn London 2014 Draft Programme

We’re pleased to announce that the SpotOn London conference will take place at the Wellcome




spot

SpotOn London: Public interest and privacy in the digital world – 14/15 November 2014

The annual conference, SpotOn London, will be taking place at the Wellcome Trust on Friday,




spot

SpotOn London 2014 – Fringe Events

To accompany this year’s SpotOn London conference, at the Wellcome Trust on Friday, 14 November




spot

Sponsors and Hosts: SpotOn London 2013

We are extremely grateful for the generous support of our sponsors; SpotOn London would not be




spot

SpotOn London 2013: Thank you to this year’s livestreaming team!

In true adherence to the age old phrase 'let them eat cake' and its traditional application to the under-funded and under-fed masses, for SpotOn London cakes were duly provided much to the enjoyment of the delegates. Since this act generated its own hashtag, it also deserves a Story...