ical Pittsburgh Bans Tests for Many Prospective and Current Employees Who Use Medical Marijuana By www.littler.com Published On :: Wed, 16 Oct 2024 14:36:29 +0000 Taylor N. Brailey and Nancy N. Delogu discuss a new Pittsburgh ordinance prohibiting employment discrimination against an individual’s status as a medical marijuana patient. SHRM View (Subscription required) Full Article
ical Ontario, Canada Appeal Court Finds Aggravated Damages Award Can Be Made Without Medical Evidence of Diagnosable Psychological Injury By www.littler.com Published On :: Tue, 13 Aug 2024 19:21:56 +0000 Court of Appeal for Ontario allowed aggravated damages for an employer’s bad-faith conduct during an employee’s dismissal in the absence of medical evidence identifying a diagnosable psychological injury. Court also found medical expert testimony is not required to show an employee is physically incapable of mitigating damages during the reasonable notice period. Full Article
ical Radical Expansion of New Jersey WARN Act Nears By www.littler.com Published On :: Mon, 17 May 2021 20:36:08 +0000 Updated June 8, 2021 Full Article
ical Return to Work: Challenges and Practical Recommendations By www.littler.com Published On :: Tue, 28 Feb 2023 15:44:26 +0000 In this How to Do Business in the Americas podcast series installment, Shareholder Juan Carlos Varela and Rodrigo Tajonar, Chief People Officer of the Boston Globe Media, discuss how organizations are dealing with the aftermath of the pandemic in the workplace. Full Article
ical Pittsburgh Ordinance Bans Tests for Many Prospective and Current Employees Who Use Medical Marijuana By www.littler.com Published On :: Thu, 03 Oct 2024 15:18:09 +0000 On September 24, 2024, the Pittsburgh City Council passed a new ordinance prohibiting discrimination against an individual’s status as a medical marijuana patient. Mayor Ed Gainey signed the ordinance the same day, making it effective immediately. Full Article
ical Managing Unfair Competition: Critical Practices for the Employer in Asia By www.littler.com Published On :: Thu, 07 Mar 2024 15:40:39 +0000 Full Article
ical The Coming Regulatory Avalanche: Engineering Practical Employment and Labor Law Compliance Solutions By www.littler.com Published On :: Thu, 07 Apr 2011 05:14:58 +0000 The focus of this 2011 Littler Report is to provide employers with information to prepare and plan for regulations recently passed and those currently making their way through the agency rulemaking process. Part One of this Littler Report will set the stage and define the challenge employers will face in the coming years as the Obama Administration enters the second half of its term. Full Article
ical Reopening and Rehiring During the COVID-19 Pandemic – Critical Employee Benefits and Executive Compensation Considerations By www.littler.com Published On :: Wed, 26 Aug 2020 20:06:37 +0000 As many employers are on the way to normalizing their business practices and re-engaging their employees, they should not overlook the many potential pitfalls in the administration of their retirement, health and welfare plans and their executive compensation arrangements. The risks of missteps are high, and include loss of tax-qualification of retirement plans, penalty taxes in connection with the Affordable Care Act’s (ACA) employer mandate rules, other IRS penalties, employee lawsuits and Department of Labor enforcement actions. Full Article
ical Predistribution, Labor Standards, and Ideological Drift: Why Some Conservatives Are Embracing Labor Unions (and Why They Shouldn't) By www.littler.com Published On :: Wed, 25 Sep 2024 20:49:18 +0000 Alexander T. MacDonald says predistributional labor policies do none of the things they’re supposed to do and, in fact, amplify the problems they’re supposed to solve. The Federalist Society View Full Article
ical Practical Ways to Reduce Workplace Theft By www.littler.com Published On :: Fri, 08 Dec 2023 21:19:21 +0000 Zoe Argento talks about the two main types of valuable and sensitive information that employees typically steal and offers ways employers can prevent workplace theft. SHRM Online View (Subscription required.) Full Article
ical Massachusetts Revises Guidance on Paid Family and Medical Leave By www.littler.com Published On :: Wed, 17 Jan 2024 21:07:50 +0000 Ellen Donovan McCann, Alice Kokodis and Jim Paretti explain the Massachusetts Department of Family and Medical Leave’s new, more employer-friendly guidance. SHRM Online View (Subscription required.) Full Article
ical New Guidance Permits Oregon Employers to Rescind Previously Protected Unpaid Family and Medical Leave Effective July 1, 2024 By www.littler.com Published On :: Mon, 13 May 2024 19:26:45 +0000 Oregon’s Paid Family and Medical Leave Insurance Program (“Paid Leave Oregon”) generally provides eligible employees with up to 12 weeks of paid time off for leave that qualifies as family, medical, or safe leave. Since Paid Leave Oregon took effect on September 3, 2023, employees have been stacking Paid Leave Oregon leave benefits and Oregon Family Leave Act (OFLA) leave benefits, leaving employers frustrated with staffing shortages. Full Article
ical Medical and Recreational Marijuana in Arizona By www.littler.com Published On :: Thu, 04 Feb 2021 16:19:10 +0000 Full Article
ical When Does Tough Talk Rise to an Ethical Violation or Even Extortion? By www.littler.com Published On :: Mon, 11 Oct 2021 17:55:18 +0000 Full Article
ical Ontario, Canada Court Orders Independent Medical Examination of Employee Claiming Indefinite Inability to Mitigate Due to Mental Health Condition By www.littler.com Published On :: Tue, 29 Oct 2024 14:51:46 +0000 Marshall v. Mercantile Exchange Corporation, 2024 CanLII 71128 (ONSC), is an action for wrongful dismissal where the employee claimed he could not mitigate his damages by seeking alternative employment indefinitely because of a mental health condition (i.e., stress and depression) allegedly arising out of his termination. He claimed a 26-month notice period. The employer sought an independent medical examination (IME) of the employee pursuant to s. Full Article
ical COVID-19 Vaccination: A Littler Global Guide on Legal & Practical Implications in the Workplace (January 2022 Update) By www.littler.com Published On :: Wed, 14 Apr 2021 19:17:28 +0000 The Firm’s International Practice Group has once again updated its COVID-19 Vaccination: A Littler Global Guide on Legal & Practical Implications in the Workplace. Two years into the pandemic, experts agree that – in the absence of newly emerging and highly transmissible variants – COVID-19 might lose its pandemic status before the end of 2022 due to the development of various COVID-19 vaccines and increasing global vaccination rates. Full Article
ical Social and Political Issues and the Workplace – Implications for Employers By www.littler.com Published On :: Wed, 12 May 2021 17:32:56 +0000 Over the past year, employers have had to grapple with seismic social, cultural, and political developments impacting profoundly how they do business. Full Article
ical Maine Poised to Enact Sweeping Paid Family and Medical Leave Law By www.littler.com Published On :: Wed, 05 Jul 2023 14:06:42 +0000 Maine is expected to join 13 other states and Washington, D.C. in implementing a paid family and medical leave program. Maine’s program, which will provide up to 12 weeks of paid leave per year, covers all eligible employees of private and public employers, except employees of the federal government, in the state regardless of employer size. Employers and employees will split a 1% payroll tax to fund the paid family and medical leave program. Full Article
ical Employers can count sick leave credits as paid medical leave days under CLC: arbitrator By www.littler.com Published On :: Tue, 12 Mar 2024 19:38:37 +0000 Rhonda Levy, Adrian Jakibchuk, Barry Kuretzky and George Vassos comment on an arbitrator’s ruling that federal employers can count employees’ sick leave credits as paid medical leave days under the Canada Labour Code (CLC) if their own program provides “a more favourable benefit” to workers. Human Resources Director Canada View Full Article
ical Connecticut Employers Can Terminate Employees Impaired by Medical Marijuana While Working; Appellate Court Also Provides Guidance for Reasonable Suspicion Drug Tests By www.littler.com Published On :: Tue, 19 Mar 2024 20:51:43 +0000 In a significant decision about workplace drug use, the Connecticut Appellate Court backed an employer’s right to terminate a worker who was impaired on the job by medical marijuana. The decision also clarified the factual basis an employer must possess to justify ordering a drug test based on suspicion of impairment. Full Article
ical OSHA 101: Practical Inspection Guidance and Regulatory Updates By www.littler.com Published On :: Wed, 07 Aug 2024 16:21:42 +0000 Full Article
ical New Colorado Law Protects Consumer Biological and Neural Data By www.littler.com Published On :: Fri, 19 Jul 2024 20:49:49 +0000 Zoe Argento talks about the new compliance requirements for employers under Colorado’s biometric privacy law. Law Week Colorado View (Subscription required) Full Article
ical The Risks Of Employee Political Discourse On Social Media By www.littler.com Published On :: Tue, 17 Sep 2024 14:15:02 +0000 Bradford Kelley and James McGehee discuss the potential risks for employers when employees use social media for political purposes. Law360 View (Subscription required) Full Article
ical Employers in Europe struggling to manage political discussions at work By www.littler.com Published On :: Wed, 16 Oct 2024 14:51:38 +0000 Stephan Swinkels and Jan-Ove Becker discuss workplace issues that European employers are struggling with, including geopolitical events, political debates and LGBTQ+ rights. Human Resources Director Asia View Full Article
ical NYC Pet Leave Bill Marks 'Radical Departure' In Sick Time Use By www.littler.com Published On :: Tue, 05 Nov 2024 21:57:28 +0000 Kelly M. Cardin provides insight about why New York City is expanding its sick leave law to let workers use it to care for pets and service animals. Law360 View (Subscription required) Full Article
ical ETSI completed its first remote Mission Critical Plugtests event By www.etsi.org Published On :: Thu, 28 Apr 2022 06:05:48 GMT ETSI completed its first remote Mission Critical Plugtests event Sophia Antipolis, 11 February 2019 ETSI has just ended its third MCX Plugtests, which is the first remote PlugtestsTM within the MCX Plugtests programme, from 3 Dec 2018 until 31 Jan 2019. Read More... Full Article
ical ETSI new upcoming mission critical Plugtests event By www.etsi.org Published On :: Wed, 18 Sep 2019 09:24:56 GMT ETSI new upcoming mission critical Plugtests event Sophia Antipolis, 18 September 2019 ETSI, in partnership with ERILLISVERKOT (State Security Networks Group Finland) and the support of TCCA and the European Commission, organizes the fourth MCX Plugtests event which will take place from 23 to 27 September 2019 at the Savonia University of Applied Sciences, KUOPIO, FINLAND. Read More... Full Article
ical Mission Critical Implementations tested during the fourth ETSI MCX Plugtests By www.etsi.org Published On :: Thu, 28 Apr 2022 06:11:15 GMT Mission Critical Implementations tested during the fourth ETSI MCX Plugtests Sophia Antipolis, 30 September 2019 The 4th ETSI MCX PlugtestsTM have concluded with a success rate of 95% of the executed tests in the validation of 3GPP mission critical services vendor interoperability. Read More... Full Article
ical ETSI releases a Technical Report on Global Acceptance of EU Trust Services By www.etsi.org Published On :: Thu, 28 Apr 2022 06:13:56 GMT ETSI releases a Technical Report on Global Acceptance of EU Trust Services Sophia Antipolis, 16 January 2020 The ETSI Technical Committee on Electronic Signatures and Infrastructures (TC ESI) is pleased to release the ETSI TR 103684 technical report. This report addresses existing trust service infrastructures that operate in different regions of the world and their possible mutual recognition/global acceptance. The report identifies ways to facilitate cross recognition between EU trust services and trust services from other schemes. The trust services are based on ETSI standards and support the eIDAS Regulation (EU) No 910/2014. Read More... Full Article
ical ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms By www.etsi.org Published On :: Thu, 28 Apr 2022 06:14:33 GMT ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms Sophia Antipolis, 5 March 2020 The ETSI Technical Committee on Core Network and Interoperability Testing (TC INT) has just released a Technical Report, ETSI TR 103 626, providing a mapping of architectural components for autonomic networking, cognitive networking and self-management. This architecture will serve the self-managing Future Internet. The ETSI TR 103 626 provides a mapping of architectural components developed in the European Commission (EC) WiSHFUL and ORCA Projects, using the ETSI Generic Autonomic Networking Architecture (GANA) model. The objective is to illustrate how the ETSI GANA model specified in the ETSI specification TS 103 195-2 can be implemented when using the components developed in these two projects. The Report also shows how the WiSHFUL architecture augmented with virtualization and hardware acceleration techniques can implement the GANA model. This will guide implementers of autonomics components for autonomic networks in their optimization of their GANA implementations. The TR addresses autonomic decision-making and associated control-loops in wireless network architectures and their associated management and control architectures. The mapping of the architecture also illustrates how to implement self-management functionality in the GANA model for wireless networks, taking into consideration another Report ETSI TR 103 495, where GANA cognitive algorithms for autonomics, such as machine learning and other AI algorithms, can be applied. Full Article
ical ETSI launches remote Plugtests Programme for Mission Critical Services to accelerate adoption and interoperability By www.etsi.org Published On :: Thu, 28 Apr 2022 06:18:00 GMT ETSI launches remote PlugtestsTM Programme for Mission Critical Services to accelerate adoption and interoperability Sophia Antipolis, 28 April 2020 To accelerate Mission Critical Services (MCS) adoption and interoperability, a key enabler to MCS deployment, ETSI is running an innovative MCX PlugtestsTM Programme. Testing sessions will also benefit from the latest ETSI specification, ETSI TS 103 564, on Plugtests scenarios for Mission Critical Services. Read More... Full Article
ical ETSI releases Technical Report on requirements for smart lifts for IoT By www.etsi.org Published On :: Thu, 28 Apr 2022 06:19:22 GMT ETSI releases Technical Report on requirements for smart lifts for IoT Sophia Antipolis, 4 June 2020 To facilitate upcoming standards, the ETSI SmartM2M technical committee has released ETSI TR 103 546, a Technical Report on smart lifts, collecting and developing the type and range of data which should be exchanged between lifts and their relevant management applications. This study paves the way for technical requirements to monitor the activities and the performance of such lifts and describe their interaction with IoT devices and applications. Read More... Full Article
ical ETSI Mission Critical Plugtests to drive Future Railway Mobile Communication System By www.etsi.org Published On :: Thu, 28 Apr 2022 06:24:33 GMT ETSI Mission Critical Plugtests to drive Future Railway Mobile Communication System Sophia Antipolis, 10 September 2020 ETSI, with the support of the European Commission, EFTA, TCCA and UIC, is organizing its fifth MCX PlugtestsTM event. The remote-only event will take place from 21 September to 2 October 2020. Pre-testing started on 31 August to debug any connectivity issues before the main event. Read More... Full Article
ical ETSI Mission Critical Plugtests event achieves a 95% interoperability success rate By www.etsi.org Published On :: Thu, 28 Apr 2022 06:26:09 GMT ETSI Mission Critical Plugtests event achieves a 95% interoperability success rate Sophia Antipolis, 2 November 2020 ETSI is pleased to announce it has now released the Report of its fifth MCX PlugtestsTM remote event that took place from 21 September to 2 October 2020. Results of the testing sessions outline an interoperability rate of 95%, giving industry a reliable set of standards for successful implementations. Highlights of this event included initial railway-oriented capabilities in 3GPP Release-15, such as functional aliases, multi-talker, helping Future Railway Mobile Communication System (FRMCS) move forward. 173 delegates from all over the world executed around 1350 test cases in 169 test sessions, interoperability results were reported in the ETSI Test reporting tool. Around fifty new test cases were developed for this event and will be added to ETSI TS 103 564. Read More... Full Article
ical ETSI releases Technical Report on Citizen Requirements for Smart Cities By www.etsi.org Published On :: Thu, 28 Apr 2022 09:28:29 GMT ETSI releases Technical Report on Citizen Requirements for Smart Cities Sophia Antipolis, 9 November 2020 The ETSI Human Factors Technical Committee has released ETSI TR 103 455, a Technical Report that assesses the different citizen-related issues that smart city-related standardization in the ICT domain needs to address. These include fundamental aspects such as accessibility, usability, interoperability, personal data protection and security, and how services to citizens are to be designed to maximize benefits to the community. The study gives an overview of existing ETSI and other SDOs standards in that field, including ETSI community indicators. It aligns well with the UN Sustainable Development Goal 11 "Make cities inclusive, safe, resilient and sustainable". Read More... Full Article
ical ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography By www.etsi.org Published On :: Wed, 06 Oct 2021 13:28:24 GMT ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography Sophia Antipolis, 6 October 2021 In 2016 the US National Institute of Standards and Technology (NIST) announced their intention to develop new standards for post-quantum cryptography. They subsequently initiated a competition-like standardization process with a call for proposals for quantum-safe digital signatures, public-key encryption schemes, and key encapsulation mechanisms. NIST have stated that they intend to select quantum-safe schemes for standardization at the end of the current, third round of evaluation. Read More... Full Article
ical New ETSI White Paper and MEC Hackathon: another step to engage with app developers and verticals By www.etsi.org Published On :: Thu, 16 Jun 2022 09:04:42 GMT New ETSI White Paper and MEC Hackathon: another step to engage with app developers and verticals Sophia Antipolis, 16 June 2022 The ETSI MEC (Multi-access Edge Computing) group is pleased to announce a new White Paper which aims to describe the deployment options related to MEC federation, especially from an architectural point of view. With a key focus on ETSI MEC implementations, it also aims to provide an open approach taking into account other standards and technologies, including those from 3GPP SA Working Group 6 and GSMA OPG. For this purpose, the White Paper first analyses the recent publications of GSMA OPG and recent updates in ETSI MEC and 3GPP specifications, then introduces the synergized architecture supported by both standards organizations, which indicates the background information for the deployment of MEC federation harmonized standards for edge computing. Read More... Full Article
ical ETSI Secures Critical Infrastructures against Cyber Quantum Attacks with new TETRA Algorithms By www.etsi.org Published On :: Mon, 07 Nov 2022 17:51:09 GMT ETSI Secures Critical Infrastructures against Cyber Quantum Attacks with new TETRA Algorithms Sophia Antipolis, 8 November 2022 With the world facing growing challenges including the war in Europe and a global energy crisis, it is essential that the mission- and business-critical communications networks used by the public safety, critical infrastructure and utilities sectors (including transportation, electricity, natural gas and water plants) are secured against third-party attacks, to protect communications and sensitive data. With more than 120 countries using dedicated TETRA (Terrestrial Trunked Radio) networks for these critical services, work has been undertaken to ensure the ETSI TETRA technology standard remains robust in the face of evolving threats. Read More... Full Article
ical ETSI Mission Critical testing event reports a 96% success rate By www.etsi.org Published On :: Fri, 16 Dec 2022 13:00:57 GMT ETSI Mission Critical testing event reports a 96% success rate Sophia Antipolis, 16 December 2022 The capabilities of Mission Critical Push-to-Talk (MCPTT), Mission Critical Data (MCData) and Mission Critical Video (MCVideo) – together abbreviated as MCX services – were tested during the seventh MCX Plugtests™ from 07 November to 11 November 2022 at the University of Malaga (UMA). The MCX ETSI Plugtests series is the first independent testing of public safety and other mission critical services over LTE and 5G networks. Read More... Full Article
ical ETSI MEC meets vertical markets, helping the drones business By www.etsi.org Published On :: Wed, 31 May 2023 12:44:24 GMT Sophia Antipolis, 23 May 2023 On 26 June 2023, ETSI will host the first panel of a series of Multi-access Edge Computing live panels. This panel will explore the drone business from a MEC perspective with a variety of speakers coming from this vertical market. Read More... Full Article
ical ETSI mission-critical Plugtests event tests direct-mode communication By www.etsi.org Published On :: Mon, 16 Oct 2023 07:08:15 GMT Sophia Antipolis, 16 October 2023 The ETSI’s 8th MCX (mission-critical) Plugtests event concluded last week at the University of Malaga. The event received support from the European Union (EU), the Critical Communications Association (TCCA), the European Free Trade Association (EFTA), EUTC (European Utilities Telecom Council) and the International Union of Railways (UIC). Read More... Full Article
ical ETSI’s Securing AI group becomes a Technical Committee to help ETSI to answer the EU AI Act By www.etsi.org Published On :: Tue, 17 Oct 2023 16:01:10 GMT Sophia Antipolis, 17 October 2023 As the second term of the Industry Specification Group Securing AI (ISG SAI) is scheduled to conclude in Q4 2023, and in line with ETSI's commitment to AI and SAI, the group has suggested the closure of ISG SAI, with its activity transferred to a new ETSI Technical Committee, TC SAI. Read More... Full Article
ical ETSI Releases TETRA Algorithms to Public Domain, maintaining the highest security for its critical communication standard By www.etsi.org Published On :: Wed, 15 Nov 2023 09:23:53 GMT Sophia Antipolis, 14 November 2023 ETSI is happy to announce that at a meeting in October of its technical committee in charge of the TETRA standard (TCCE), a full consensus was reached to make the primitives of all TETRA Air Interface cryptographic algorithms available to the public domain. Read More... Full Article
ical ETSI Mission Critical testing event reports a 95% success rate By www.etsi.org Published On :: Wed, 22 Nov 2023 09:34:28 GMT Sophia Antipolis, 22 November 2023 The Report of the eight MCX Plugtests™ event that took place from 9 October to 13 October 2023 at University of Malaga (UMA) is now available. The Report shows a success rate of 95% interoperability of the 3GPP mission critical services executed tests. Read More... Full Article
ical ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control By www.etsi.org Published On :: Fri, 12 Apr 2024 09:02:36 GMT Sophia Antipolis, 31 January 2024 The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices. Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets. Read More... Full Article
ical Aiming high: ETSI Conference on Non-Terrestrial Networks underlines critical role of NTN in realizing tomorrow’s global 6G vision By www.etsi.org Published On :: Tue, 16 Apr 2024 08:12:24 GMT Sophia Antipolis, 15 April 2024 This year’s first ETSI Conference on Non-Terrestrial Networks has stressed the importance of technical standardization in delivering a fully connected planet via NTN, a key element of tomorrow’s global 6G networks. Held from 3-4 April 2024 at ETSI’s Sophia Antipolis headquarters, the event was co-organized with the European Space Agency (ESA), the 6G Smart Networks and Services Industry Association (6G-IA) and the Smart Networks and Services Joint Undertaking (SNS JU). Titled ‘Non-Terrestrial Networks, a Native Component of 6G’, the 2-day conference attracted over 200 participants from 25 countries, including experts in standardization and research as well as industrial representation from the mobile, satellite and wider space industries. Delegates shared perspectives on NTN use cases, candidate technology solutions, current research status and standardization roadmaps. Day one sessions focused on the opportunities and challenges of integrating terrestrial and non-terrestrial networks within tomorrow’s global communications landscape. The second day afforded a deep dive into numerous cutting-edge NTN and 6G research & development initiatives in Europe and around the world. Read More... Full Article
ical TeraFlowSDN Release 3 Provides a Cloud-based Network Automation Platform Featuring New Optical SDN Controller and Expanded Support for Disaggregated Networks By www.etsi.org Published On :: Tue, 11 Jun 2024 15:19:13 GMT Sophia Antipolis, 30 April 2024 The ETSI TeraFlowSDN community is proud to announce the third release of TeraFlowSDN, an innovative and robust SDN orchestrator and controller, delivering a fully featured Network Automation Platform. In this latest release, TeraFlowSDN enhances its capabilities with the integration of an Optical SDN controller, expanding device support to include gNMI and OpenConfig protocols. It also features enriched network integrations for end-to-end orchestration like IP over DWDM, L3VPN, MEC, and network topology exposure. The management of network topologies is improved with the addition of a new BGP-LS speaker able to discover the topologies, and a new Forecaster component is introduced, providing predictive insights for network management. These additions substantially augment the versatility and management capabilities of the TeraFlowSDN platform. Read More... Full Article
ical Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
ical Social Media for Science Outreach – A Case Study: Chemicals Are Your Friends By www.nature.com Published On :: Wed, 22 May 2013 11:00:40 +0000 To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case Full Article Featured Guest Posts Outreach SpotOn NYC (#SoNYC) Uncategorized #reachingoutsci Social Media Case Study
ical Political constraints and opportunities for agricultural investment in Sudan [in Arabic] By www.ifpri.org Published On :: Thu, 13 Apr 2023 5:05:01 EDT قدمة تستعرض هذه المذكرة المشهد السياسي المعاصر في السودان،وكيفية تأثيرهعلى جدوى الاستثماراتفي القطاع الزراعيالتي تشتد الحاجة إليها لتحقيق التحول الزراعي في البلاد. ت ركزالمذكرة بشكل خاص على سلاسل القيمة في قطاعي الثروة الحيوانية والبستنة فيولاية الخرطوم،وإدارة الموارد الطبيعية في ولايتي النيل الأزرق وجنوب كردفان. أهملت الحكومات المتعاقبة إلى حد كبير قطاع الزراعة على الرغم من أنه أكبر قطاع توظيف في السودان ويساهم بنحو 56في المئة من إجمالي الصادرات (بنك السودان المركزي، 2020). Full Article