m CIS Audit Summary By www.tenable.com Published On :: Tue, 25 Jul 2023 08:00:00 -0400 When dealing with compliance regulations, each organization can face a variety of potential risks. Without having a full understanding of an organization’s risk exposure, critical systems and data will be at risk for attacks or data leakage. The Center for Internet Security (CIS) developed a series of best practice benchmarks for a variety of applications, operating systems, servers, and databases used within organizations today. Each benchmark contains recommended security settings designed to harden systems and applications from attack while maintaining overall system functionality. The components in these dashboards present a summary of results gathered from CIS compliance scans using the CIS Benchmarks. Tenable has been certified by CIS to perform a wide variety of platform and application audits based on the best practice consensus benchmarks developed by CIS. Tenable submits example test cases for all of the criteria within each unique benchmark, and then submits our results to CIS personnel for official certification. Tenable has developed audit files based on the CIS Benchmarks tested on systems, and has been approved and certified by CIS staff members. When performing managed scans with Tenable.sc, some CIS audits require additional patch audits and vulnerability checks. Any additional requirements for completing an audit using the CIS Benchmarks will be included within the audit file description text. In some cases, multiple scans may be required, as Tenable provides both Level 1 and Level 2 audit checks. Level 1 checks provide minimum settings recommendations, and are generally considered safe to apply to most systems. Level 2 checks include recommendations for complex or highly secure environments, and can lead to reduced functionality of systems within the network. Information presented within these dashboards includes a summary of CIS audit checks currently supported by Tenable. Results will highlight one of three severity levels that will provide valuable information analysts can use to harden systems within the enterprise. The informational severity level is considered “Passed”, indicating that the configuration setting matches the expected result of the audit check. Results assigned a medium severity must be evaluated by an analyst to determine whether the results are accurate or not. When an audit check fails, the severity is set to high, indicating that the collected result and the expected result do not match. Each failure should be reviewed, fixed, and re-scanned to ensure that the system has been secured properly. Using these benchmarks will help to assess the effectiveness of existing security controls on systems, and provide the critical context needed to strengthen an organization's security posture. If needed, audit files can be modified to an organization’s specific requirements. Additional information on how to edit audit files can be found within the “Nessus Compliance Checks” document in the Support Portal. These dashboards are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboards can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are: Tenable.sc 5.2.0 Nessus 8.6.0 CIS Audit Files Compliance Data In order to maintain the overall security of systems and data within the enterprise, organizations must have an effective and repeatable way to measure compliance results. Tenable Tenable.sc helps organizations obtain results using the CIS Benchmarks by measuring compliance in real time, providing an accurate assessment of an organization’s security posture. By prioritizing remediation actions of misconfigured systems, the organization can maximize their investment in compliance reporting and system hardening efforts. With more supported technologies than any other vendor, Tenable assists organizations in obtaining the most comprehensive view of the network and the intelligence needed to assess and protect systems using CIS compliance standards. There are 3 dashboards with over 40 individual components. As with all dashboards in Tenable.sc, individual components can be rearranged, edited, or removed to focus on the components of interest. To edit or delete a component, click on the Gear menu in the upper-right title area of a component and select the appropriate menu item. Components can be rearranged using drag and drop. To change the visual display of the entire dashboard, for example from 3 columns to 2 columns or 1 column, from the Options menu select Edit Dashboard and select a layout style. The following dashboards are available: CIS Audit Summary (Networking and Applications): This dashboard provides the components for application servers (Apache, MongoDB, Oracle, RDMS), networking or container based services (Cisco, Docker, Kubernetes, Palo Alto, VMwareESXi) and other similar benchmarks. CIS Audit Summary (Microsoft): This dashboard provides the components for all Microsoft benchmarks, including servers, workstation, and various other applications. CIS Audit Summary (Linux Benchmarks): This dashboard provides the components for AlmaLinux, Rocky Linux, Amazon Linux, CentOS, Debian, Fedora, HP-UX, macOS, NGINX, RedHat, SUSE, and other similar operating systems. Full Article
m WAS Executive Summary By www.tenable.com Published On :: Mon, 21 Aug 2023 19:41:49 -0400 From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more. Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations. Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this dashboard highlights the top most vulnerable web applications and assets at risk for exploitation. This dashboard leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data. The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft. In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this dashboard leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the dashboard enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. The requirement for this dashboard is: Tenable Web App Scanning. Components Top 100 Most Vulnerable Web Applications (Last 14 Days): The table displays a list of the vulnerabilities the application from most severe to least severe. This information enables analysts to prioritize remediation efforts by identifying the top vulnerabilities to remediate that will reduce the organization's overall attack surface. Top 100 WAS Vulnerabilities by Plugins (Last 14 Days): This table provides a list of Web Application vulnerabilities that have been seen within the last 14 days as well as the total number of instances of each vulnerability. The Plugin Family is displayed as well as the Plugin ID and Severity of each vulnerability. This information enables analysts to prioritize remediation efforts by identifying the top vulnerabilities to remediate that will reduce the organization's overall attack surface. Web App Vulnerabilities by State: This matrix provides a view into the vulnerability life cycle for web applications. Tracking web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts. Top 2021 OWASP Categories Discovered in the Last 14 Days: This matrix displays active Web Application vulnerabilities from Tenable Web App Security by OWASP category for 2021. Displayed is a row for assets and vulnerabilities for each OWASP category. Full Article
m File Transfer Solutions Targeted by CL0P Ransomware Group By www.tenable.com Published On :: Wed, 08 Nov 2023 15:43:19 -0500 The CL0P Ransomware Group, also known as TA505, has exploited zero-day vulnerabilities across a series of file transfer solutions since December 2020. File transfer solutions often contain sensitive information from a variety of organizations. This stolen information is used to extort victims to pay ransom demands. In 2023, CL0P claimed credit for the exploitation of vulnerabilities in both Fortra’s GoAnywhere Managed File Transfer (MFT) and Progress Software’s MOVEit Transfer solutions.Research conducted as part of security audits has revealed additional vulnerabilities. This dashboard contains a list of vulnerabilities known to be exploited by the CL0P ransomware group as well as other vulnerabilities that could be leveraged by CL0P and other threat actors. Operations teams can use this data to identify the assets affected by the associated CVEs targeted by the CL0P ransomware group. The following Nessus plugins identify the affected vulnerabilities: 90190: Progress MOVEit Transfer Installed (Windows)176735: Progress MOVEit Transfer Web Interface Detection176736: Progress MOVEit Transfer FTP Detection176567: Progress MOVEit Transfer177371: Progress MOVEit Transfer Critical Vulnerability (June 15, 2023)The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable Security Center Feed under the category Security Industry Trends.The requirements for this dashboard are:Tenable Security Center 6.1.1Tenable Nessus 10.5.2The Security Response Team (SRT) in Tenable Research digs into technical details and tests proof-of-concept attacks, when available, to ensure customers are fully informed of risks. The SRT also provides breakdowns for the latest vulnerabilities in the Tenable blog.Tenable Research has posted the FAQ for MOVEit Transfer Vulnerabilities and CL0P Ransomware Gang blog post to provide the latest information about this threat.ComponentsCL0P Ransomware Group MOVEit – This table displays assets that are vulnerable to recent targeted attacks by the CL0P Ransomware Group (aka TA505) related to Progress Software’s MOVEit Transfer solutions. The component specifically provides results for pluginIDs 90190, 176735, 176736, 176567, 177082, and 177371. These vulnerabilities are associated with a zero-day that is actively being exploited. The table displays the IP address, NetBIOS, DNS, and OS CPE of any identified vulnerable assets, and the Vulnerabilities severity bar.CL0P Ransomware Group Fortra GoAnywhere MFT – This table displays assets that may be vulnerable to recent targeted attacks by the CL0P Ransomware Group (aka TA505) related to Fortra GoAnywhere Managed File Transfer (MFT). The component specifically provides results for pluginIDs 171845, 171558, 171771, and 113896. These vulnerabilities are associated with a zero-day that is actively being exploited. The table displays the IP address, NetBIOS, DNS, OS CPE of any identified vulnerable assets, and the Vulnerabilities severity bar. CL0P Ransomware Group Accellion File Transfer – This table displays assets that may be vulnerable to recent targeted attacks by the CL0P Ransomware Group (aka TA505) for CGI abuses related to Accellion Secure File Transfer. The component specifically provides results for pluginIDs 85007, 146927, and 154933. These vulnerabilities are associated with a zero-day that is actively being exploited by the CL0P Ransomware Group, also known as TA505. The table displays the IP address, NetBIOS, DNS, and OS CPE of any identified vulnerable assets, and the Vulnerabilities severity bars.CL0P Ransomware Group Patched Assets – This table displays vulnerabilities that have been remediated related to recent targeted attacks by the CL0P Ransomware Group (aka TA505). The remediated vulnerabilities displayed are specifically related to the vulnerabilities related to Progress Software’s MOVEit Transfer solutions, Fortra GoAnywhere Managed File Transfer, and Accellion Secure File Transfer. These vulnerabilities are associated with a zero-day that is actively being exploited. The table displays the PluginID, Vulnerability Name, Plugin Family, Severity, and Total of remediated vulnerabilities. Full Article
m AI/LLM Findings Dashboard By www.tenable.com Published On :: Mon, 05 Aug 2024 09:53:56 -0400 In an era of rapidly evolving Artificial Intelligence/Large Language Model (AI/LLM) technologies, cybersecurity practitioners face significant challenges in monitoring unauthorized AI solutions, detecting AI vulnerabilities, and identifying unexpected AI/LLM development. Tenable Security Center leverages advanced detection technologies - agents, passive network monitoring, dynamic application security testing, and distributed scan engines - to surface AI/LLM software, libraries, and browser plugins. The risk managers utilize this dashboard to begin a comprehensive review of the AI/LLM packages in systems and web applications, along with associated vulnerabilities, mitigating risks of exploitation, data leakage, and unauthorized resource consumption.This dashboard provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.AI/LLM technologies are promising and can transform many industries and businesses, offering new innovation and efficiency opportunities. However, the technology represents a huge security challenge at many layers and this impact should not be overlooked. By using Tenable Security Center and Tenable Web App Scanning the organization is able to take a security-first approach. When combined with best practices and robust governance policies, the organizations can harness the power of AI/LLM and mitigate the associated emerging threats.ComponentsAI/LLM Software Known to Nessus: This matrix provides summary counts of AI/LLM use by leveraging Nessus plugin (196906). This column chart uses the Plugin ID filter and Plugin Output filter to show the AI/LLM applications found on assets scanned using Nessus. Each label displayed is the pattern added to the plugin output search. This search allows the security managers a simplified approach to beginning the understanding into AI usage.AI/LLM Top 5 Applications: This matrix provides the counts top 5 utilized AI/LLM applications discovered by Tenable Research. The cells use the Plugin ID (196906) and Plugin Output filter to show the AI/LLM application. Each label displayed is the pattern added to the plugin output search. This search allows the security managers a simplified approach to beginning the understanding into AI usage. The top 5 utilized list consists of: TensorFlow, NumPy, H2O Flow, HuggingFace, and scikit-learn.AI/LLM Detection Statistics: This matrix provides summary counts of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web App Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.AI/LLM Software Detected by NNM & WAS: AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.AI/LLM Browser Extensions: This matrix provides summary counts of AI/LLM use by leveraging Nessus plugin (196906). The cells use the Plugin ID filter and Plugin Output filter to show the AI/LLM browser extensions grouped into three search patterns. Each label displayed is the pattern added to the plugin output search. This search allows the security managers a simplified approach to beginning the understanding into AI usage. Full Article
m Outstanding Remediations Tracking By www.tenable.com Published On :: Thu, 19 Sep 2024 08:00:00 -0400 One of the common questions often asked of the IT team is “how many systems are missing patches and how many patches are missing on each system?” This dashboard uses the “Patch Report” plugin and organizes the current patch status for systems scanned with credentials. The IT team can now easily communicate the specific systems with missing patches to executives.The Nessus "Patch Report" plugin (66334) elegantly summarizes all of the missing patches and general remediation actions required to remediate the discovered vulnerabilities on a given host. Instead of counting the number of vulnerabilities, the plugin lists applications that need to be upgraded. The approach is not only much easier for IT administrators to consume, but the count of applications provides a measure of how much "work" is required to secure a system.The dashboard provides risk guidance using the “Remediation Summary” tool. This tool works by employing a concept called “top patch”. Tenable Security Center uses proprietary technology to identify a chain of patches. The first patch in the chain is called the “top patch”. If the “top patch” is applied, all subsequent vulnerabilities will also be remediated at the same time. Using both the Remediation Summary tool and “Patch Report” plugin, the organization can better plan remediation efforts. The dashboard and its components are available in the Tenable Security Center Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable Security Center Feed under the category Executive. The dashboard requirements are:Tenable Security CenterNessusThis dashboard requires “Full Text Search” to be enabled for each analyzed repository.Please note the "Full Text Search" option must be enabled for the repository to support the trending component.Tenable Security Center has the ability to identify all discoverable vulnerabilities, eliminating blind spots. Tenable detects missing patches, incorrect configurations, lapsed defenses, incomplete monitoring and network intruders—so you can mitigate them. Tenable Security Center can show risk across all systems, enabling informed decisions. Tenable’s approach to continuous monitoring reaches across cloud, virtual, mobile and traditional systems and measures attack vectors in each of these domains. Tenable Security Center provides a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models. By providing that single point of data collection, Tenable.sc enables sharing of vulnerability scanning results across the technical groups and business owners. Tenable.sc is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. ComponentsRemediations Tracking - Top 25 Remediations: This component provides the top 25 remediation actions that can be taken to reduce overall risk. The table is sorted using vulnerability weight scores, which are calculated differently for each organization. To determine score weights, login with the admin account, edit your organization and then select “Analysis”. In the upper right hand corner, there are four scores, one for each severity level. The default scores are: critical = 40, high = 10, medium = 3 and low = 1. The vulnerability weight helps to determine a fully calculated score used in risk analysis.The Outstanding Remediations - Time Since Patch Publication (Assets) matrix displays the total count of missing patches across the environment. The matrix is comprised of five columns. The first column provides a count of the vulnerabilities that are exploitable, and the last four columns provide counts of vulnerabilities based on Vulnerability Priority Rating (VPR) levels. VPR scores are displayed as column headers in traditional severity text. Critical represents VPR 9-10, High represents VPR 7-8.9, Medium represents VPR 4-6.9, and Low represents VPR 0.1-3.9. Each row filters the vulnerabilities based on the patch publication date of less than 30 days ago, Current Quarter, Last Quarter, Current Year, Last Year, and greater than 365 Days.The End of Life Software Detection table displays a list of software that is no longer supported by the vendor. The table is sorted by the count column, which lists a count of the total number of assets affected by the unsupported software package. The filter used is for Plugin Name equals Unsupported. Tenable recommends that assets found here be upgraded to a higher supported version as soon as possible, since vendors no longer list active vulnerabilities for end-of-life software.The Outstanding Remediations by Device Type (Vulnerabilities) matrix displays the total count of missing patches by device type. The matrix is comprised of five columns. The first column provides a count of the vulnerabilities that are exploitable, and the last four columns provide counts of vulnerabilities based on Vulnerability Priority Rating (VPR) levels. VPR scores are displayed as column headers in traditional severity text. Critical represents VPR 9-10, High represents VPR 7-8.9, Medium represents VPR 4-6.9, and Low represents VPR 0.1-3.9. There is a row present which groups devices by type, such as Linux, Windows, or macOS devices. Counts present in each cell represents the number of vulnerabilities present for the device group and VPR score. Full Article
m Block of the Month By host6.evanced.info Published On :: When: Wednesday, December 12, 2018 - 5:30 PM - 7:30 PMWhere: Xenia Library at Meeting Room, 2nd FloorTHIS PROGRAM IS DESIGNED FOR PEOPLE WHO NEED TO USE THE LIBRARY SEWING MACHINES.The pattern "No Measure Bargello" will be taught on the second Wednesday of each month starting March 14, 2018. Because it is a continuing program, it is important that you attend all sessions. The pattern takes a very difficult quilt design and makes it easy. You will complete a quilt top, learn how to sandwich a quilt together, machine quilt and bind it. All material will be provided for a lap size quilt. You will love the look and the easy way of creating such a stunning quilt. Full Article Crafts & Art Adults
m Block of the Month By host6.evanced.info Published On :: When: Wednesday, December 12, 2018 - 5:25 PM - 7:25 PMWhere: Xenia LibraryTHIS PROGRAM IS DESIGNED FOR PEOPLE WHO CAN BRING THEIR OWN SEWING MACHINES.The pattern "No Measure Bargello" will be taught on the second Wednesday of each month starting March 14, 2018. Because it is a continuing program, it is important that you attend all sessions. The pattern takes a very difficult quilt design and makes it easy. You will complete a quilt top, learn how to sandwich a quilt together, machine quilt and bind it. All material will be provided for a lap size quilt. You will love the look and the easy way of creating such a stunning quilt. Full Article Crafts & Art Adults
m Block of the Month By host6.evanced.info Published On :: When: Wednesday, December 12, 2018 - 3:00 PM - 5:00 PMWhere: Xenia LibraryTHIS PROGRAM IS DESIGNED FOR PEOPLE WHO CAN BRING THEIR OWN SEWING MACHINES.The pattern "No Measure Bargello" will be taught on the second Wednesday of each month starting March 14, 2018. Because it is a continuing program, it is important that you attend all sessions. The pattern takes a very difficult quilt design and makes it easy. You will complete a quilt top, learn how to sandwich a quilt together, machine quilt and bind it. All material will be provided for a lap size quilt. You will love the look and the easy way of creating such a stunning quilt. Full Article Crafts & Art Adults
m Block of the Month By host6.evanced.info Published On :: When: Wednesday, December 12, 2018 - 3:00 PM - 5:00 PMWhere: Xenia Library at Meeting Room, 2nd FloorTHIS PROGRAM IS DESIGNED FOR PEOPLE WHO NEED TO USE THE LIBRARY SEWING MACHINES.The pattern "No Measure Bargello" will be taught on the second Wednesday of each month starting March 14, 2018. Because it is a continuing program, it is important that you attend all sessions. The pattern takes a very difficult quilt design and makes it easy. You will complete a quilt top, learn how to sandwich a quilt together, machine quilt and bind it. All material will be provided for a lap size quilt. You will love the look and the easy way of creating such a stunning quilt. Full Article Crafts & Art Adults
m Board of Trustees Meeting, Xenia By host6.evanced.info Published On :: When: Wednesday, December 12, 2018 - 2:00 PM - 4:00 PMWhere: Greene County Public LibraryThe Board of Trustees of the Greene County Public Library system will hold a regular meeting at the Xenia Community Library. The Library Board meets on the second Wednesday of each month, except during the month of August when there is no meeting.Open to the public. Full Article Board Meeting Adults
m Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal By www.ifpri.org Published On :: Wed, 21 Aug 2024 16:11:56 +0000 Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal Integrating key goals of food system transformation. The post Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal appeared first on IFPRI. Full Article
m Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America By www.ifpri.org Published On :: Tue, 03 Sep 2024 16:14:37 +0000 Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America Tools for food system policy development. The post Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America appeared first on IFPRI. Full Article
m Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles By www.ifpri.org Published On :: Tue, 03 Sep 2024 16:16:59 +0000 Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles Enfoques para el desarrollo de políticas del sistema alimentario. The post Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles appeared first on IFPRI. Full Article
m Enhancing milk quality in Uganda: Challenges and innovations in the dairy value chain By www.ifpri.org Published On :: Mon, 09 Sep 2024 17:28:31 +0000 Enhancing milk quality in Uganda: Challenges and innovations in the dairy value chain Improving market incentives. The post Enhancing milk quality in Uganda: Challenges and innovations in the dairy value chain appeared first on IFPRI. Full Article
m Beyond the Health Extension Program: Developing a focused approach to improve nutrition in Ethiopia By www.ifpri.org Published On :: Wed, 11 Sep 2024 15:24:36 +0000 Beyond the Health Extension Program: Developing a focused approach to improve nutrition in Ethiopia A study points to reforms. The post Beyond the Health Extension Program: Developing a focused approach to improve nutrition in Ethiopia appeared first on IFPRI. Full Article
m Limiting deforestation involves complex tradeoffs: Results from a global land-use model By www.ifpri.org Published On :: Fri, 13 Sep 2024 18:10:17 +0000 Limiting deforestation involves complex tradeoffs: Results from a global land-use model Many dimensions of combating climate change. The post Limiting deforestation involves complex tradeoffs: Results from a global land-use model appeared first on IFPRI. Full Article
m How much does take-up timing for agricultural inputs depend on price? Evidence from an experiment in Nigeria By www.ifpri.org Published On :: Wed, 18 Sep 2024 16:34:45 +0000 How much does take-up timing for agricultural inputs depend on price? Evidence from an experiment in Nigeria Insights into buying behavior. The post How much does take-up timing for agricultural inputs depend on price? Evidence from an experiment in Nigeria appeared first on IFPRI. Full Article
m Potential impact of zinc-enriched rice on zinc intakes in Bangladesh, Indonesia, and the Philippines By www.ifpri.org Published On :: Fri, 20 Sep 2024 13:31:44 +0000 Potential impact of zinc-enriched rice on zinc intakes in Bangladesh, Indonesia, and the Philippines Nutritional benefits of enhanced biofortification. The post Potential impact of zinc-enriched rice on zinc intakes in Bangladesh, Indonesia, and the Philippines appeared first on IFPRI. Full Article
m Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria By www.ifpri.org Published On :: Thu, 26 Sep 2024 16:29:26 +0000 Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria Examining the effectiveness of vouchers and marketing information. The post Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria appeared first on IFPRI. Full Article
m The likely U.S. longshoreman strike and its implications for agricultural trade By www.ifpri.org Published On :: Mon, 30 Sep 2024 19:03:09 +0000 The likely U.S. longshoreman strike and its implications for agricultural trade Disruptions ahead for some developing countries exporting to the U.S. The post The likely U.S. longshoreman strike and its implications for agricultural trade appeared first on IFPRI. Full Article
m One year of war in Gaza: Food emergency continues with no end in sight By www.ifpri.org Published On :: Fri, 04 Oct 2024 13:49:49 +0000 One year of war in Gaza: Food emergency continues with no end in sight Problems of feeding more than 2 million people in a war zone. The post One year of war in Gaza: Food emergency continues with no end in sight appeared first on IFPRI. Full Article
m Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies By www.ifpri.org Published On :: Fri, 11 Oct 2024 14:09:33 +0000 Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies Key steps to strengthen institutions and relationships The post Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies appeared first on IFPRI. Full Article
m Reach, Benefit, Empower, Transform: Approaches to helping rural women secure their resource rights By www.ifpri.org Published On :: Mon, 14 Oct 2024 16:08:25 +0000 Reach, Benefit, Empower, Transform: Approaches to helping rural women secure their resource rights Avenues to empowerment. The post Reach, Benefit, Empower, Transform: Approaches to helping rural women secure their resource rights appeared first on IFPRI. Full Article
m Mercosur Outlook launch: Charting a course for sustainable agricultural growth amid uncertainty By www.ifpri.org Published On :: Wed, 16 Oct 2024 14:37:30 +0000 Mercosur Outlook launch: Charting a course for sustainable agricultural growth amid uncertainty Meeting challenges of the coming growing season and beyond in South America. The post Mercosur Outlook launch: Charting a course for sustainable agricultural growth amid uncertainty appeared first on IFPRI. Full Article
m Comprehensive sanitation in India: Despite progress, an unfinished agenda By www.ifpri.org Published On :: Wed, 23 Oct 2024 17:03:18 +0000 Comprehensive sanitation in India: Despite progress, an unfinished agenda Building on improvements in Infant mortality. The post Comprehensive sanitation in India: Despite progress, an unfinished agenda appeared first on IFPRI. Full Article
m Unleashing the potential of Generation Z for food system transformation in Africa By www.ifpri.org Published On :: Mon, 28 Oct 2024 14:42:28 +0000 Unleashing the potential of Generation Z for food system transformation in Africa A new research agenda. The post Unleashing the potential of Generation Z for food system transformation in Africa appeared first on IFPRI. Full Article
m Achieving women’s empowerment beyond income and asset increases: What do we still need to know? By www.ifpri.org Published On :: Tue, 29 Oct 2024 13:47:18 +0000 Achieving women’s empowerment beyond income and asset increases: What do we still need to know? How development organizations think about gender. The post Achieving women’s empowerment beyond income and asset increases: What do we still need to know? appeared first on IFPRI. Full Article
m World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems By www.ifpri.org Published On :: Thu, 31 Oct 2024 16:12:18 +0000 World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems IFPRI researchers on urbanization. The post World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems appeared first on IFPRI. Full Article
m From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia By www.ifpri.org Published On :: Thu, 07 Nov 2024 14:58:06 +0000 From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia The power of bundled solutions The post From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia appeared first on IFPRI. Full Article
m Resource-poor rice farmers in Myanmar suffer double impact from political conflict By www.ifpri.org Published On :: Tue, 12 Nov 2024 17:09:45 +0000 Resource-poor rice farmers in Myanmar suffer double impact from political conflict Productivity erodes amid turmoil. The post Resource-poor rice farmers in Myanmar suffer double impact from political conflict appeared first on IFPRI. Full Article
m PenderFund Capital Management Ltd. By www.osc.ca Published On :: Thu, 31 Oct 2024 14:05:44 GMT HeadnotePursuant to National Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief from the prohibition on the use of corporate officer titles by certain registered individuals in respect of institutional clients -- Relief does not extend to interact Full Article
m Miata Holdings Inc. By www.osc.ca Published On :: Thu, 31 Oct 2024 14:33:42 GMT HeadnoteNational Policy 11-206 Process for Cease to be a Reporting Issuer Applications -- The issuer ceased to be a reporting issuer under securities legislation.Applicable Legislative ProvisionsSecurities Act, R.S.O. 1990, c. S.5, as am., s. 1(10)(a)(ii). Full Article
m Notice of Correction – Miata Holdings Inc. By www.osc.ca Published On :: Thu, 07 Nov 2024 15:01:04 GMT The Order for Miata Holdings Inc. published October 31, 2024 in (2024), 47 OSCB 8430 contained a typographical error. The lettered list following the second paragraph should be numbered as follows: Full Article
m Taiga Motors Corporation By www.osc.ca Published On :: Thu, 07 Nov 2024 15:04:05 GMT HeadnoteNational Policy 11-206 Process for Cease to be a Reporting Issuer Applications and National Policy 11-207 Failure-to-File Cease Trade Orders and Revocations in Multiple Jurisdictions -- application for order that issuer is not a reporting issuer and for full revocation of failure Full Article
m Brandes Investment Partners & Co. By www.osc.ca Published On :: Thu, 07 Nov 2024 15:06:33 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from paragraphs 2.5(2)(a) and (c) of National Instrument 81-102 Investment Funds to permit investment funds to invest up to 10% of their respective net asset value, in the Full Article
m EHP Funds Inc. and EHP Global Multi-Strategy Alternative Fund By www.osc.ca Published On :: Thu, 07 Nov 2024 15:09:26 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from fund multi-layering restriction in paragraph 2.5(2)(b) of NI 81-102 to permit an investment fund to invest in another investment fund under common management that hol Full Article
m Canada Life Investment Management Ltd. By www.osc.ca Published On :: Thu, 07 Nov 2024 15:10:58 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Exemption granted to existing and future alternative investment funds from the margin deposit limits in subsection 6.8(1) and paragraph 6.8(2)(c) of NI 81-102 to permit each fund to depo Full Article
m CI Investments Inc. By www.osc.ca Published On :: Thu, 07 Nov 2024 15:16:46 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- relief granted under subsection 62(5) of the Securities Act to permit the extension of prospectus lapse dates by 52 days, 83 days, 99 days, 126 days, 148 days, and 191 days -- relief gra Full Article
m Miata Holdings Inc. By www.osc.ca Published On :: Thu, 07 Nov 2024 15:21:29 GMT HeadnoteNational Policy 11-206 Process for Cease to be a Reporting Issuer Applications -- The issuer ceased to be a reporting issuer under securities legislation.Applicable Legislative ProvisionsSecurities Act, R.S.O. 1990, c. S.5, as am., s. 1(10)(a)(ii). Full Article
m Miata Holdings Inc. – s. 1(6) of the OBCA By www.osc.ca Published On :: Thu, 07 Nov 2024 15:24:01 GMT HeadnoteApplicant deemed to have ceased to be offering its securities to the public under the Business Corporations Act (Ontario).Applicable Legislative ProvisionsBusiness Corporations Act , R.S.O. 1990, c. B.16, as am., s. 1(6). Full Article
m 1832 Asset Management L.P. By www.osc.ca Published On :: Thu, 07 Nov 2024 15:26:42 GMT HeadnoteNational Policy 11-203 -- Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from NI 41-101 to funds offering exchange-traded and conventional mutual fund series under a single simplified prospectus -- subject to conditions -- Technical relief g Full Article
m RP Investment Advisors LP and The Funds By www.osc.ca Published On :: Thu, 07 Nov 2024 15:28:52 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- relief granted revoking and replacing existing short selling, cash cover and custodial relief to extend existing relief beyond a "government security" as defined in NI 81-102 to also inc Full Article
m Jamestown, the truth revealed / William M. Kelso. By library.gcpl.lib.oh.us Published On :: Jamestown, the Truth Revealed produces a vivid picture of the settlement that is far more complex, incorporating the most recent archaeology and using twenty-first-century technology to give Jamestown its rightful place in history and thus contributing to a broader understanding of the transatlantic world. Full Article
m Rules for resistance : advice from around the globe for the age of Trump / edited and with an introduction by David Cole ; co-edited by Melanie Wachtell Stinnett. By library.gcpl.lib.oh.us Published On :: Full Article
m Why irrational politics appeals : understanding the allure of Trump / Mari Fitzduff, editor. By library.gcpl.lib.oh.us Published On :: Full Article
m Autumn of the Black Snake : the creation of the U.S. Army and the invasion that opened the West / William Hogeland. By library.gcpl.lib.oh.us Published On :: An account of how the U.S. Army was created to fight a crucial Native American war. Describes how George Washington and other early leaders organized the Legion of the United States under General "Mad" Anthony Wayne in response to a 1791 militia defeat in the Ohio River Valley. -- Publisher Full Article
m The water kingdom : a secret history of China / Philip Ball. By library.gcpl.lib.oh.us Published On :: From the Yangtze to the Yellow River, China is traversed by great waterways, which have defined its politics and ways of life for centuries. Water has been so integral to China’s culture, economy, and growth and development that it provides a window on the whole sweep of Chinese history. In The Water Kingdom, renowned writer Philip Ball opens that window to offer an epic and powerful new way of thinking about Chinese civilization. Full Article
m October : the story of the Russian Revolution / China Miéville. By library.gcpl.lib.oh.us Published On :: "Acclaimed fantasy author China Mieville plunges us into the year the world was turned upside down… The renowned fantasy and science fiction writer China Mieville has long been inspired by the ideals of the Russian Revolution and here, on the centenary of the revolution, he provides his own distinctive take on its history. In February 1917, in the midst of bloody war, Russia was still an autocratic monarchy: nine months later, it became the first socialist state in world history. How did this unimaginable transformation take place? How was a ravaged and backward country, swept up in a desperately unpopular war, rocked by not one but two revolutions? This is the story of the extraordinary months between those upheavals, in February and October, of the forces and individuals who made 1917 so epochal a year, of their intrigues, negotiations, conflicts and catastrophes. From familiar names like Lenin and Trotsky to their opponents Kornilov and Kerensky; from the byzantine squabbles of urban activists to the remotest villages of a sprawling empire; from the revolutionary railroad Sublime to the ciphers and static of coup by telegram; from grand sweep to forgotten detail. Historians have debated the revolution for a hundred years, its portents and possibilities: the mass of literature can be daunting. But here is a book for those new to the events, told not only in their historical import but in all their passion and drama and strangeness. Because as well as a political event of profound and ongoing consequence, Mieville reveals the Russian Revolution as a breathtaking story." -- Provided by publisher. Full Article
m The Russian Revolution : a new history / Sean McMeekin. By library.gcpl.lib.oh.us Published On :: "In The Russian Revolution, historian Sean McMeekin traces the origins and events of the Russian Revolution, which brought an end to Romanov rule and ushered the Bolsheviks into power. Between the dawn of the 20th century and 1920, Russia underwent a complete and irreversible transformation, the effects of which would reverberate throughout the world for decades to come. At the turn of the century, the Russian economy, which still trailed behind Britain, France, Germany, and the U.S., was growing by about 10% annually, and its population had reached 150 million. But by 1920, a new regime was in place, the country was in desperate financial straits, and between 20 and 25 million Russians had died during the Revolution and the Civil War, the Red Terror, and the economic collapse that followed. Still, Bolshevik power remained intact through a remarkable combination of military prowess, violent terror tactics, and the bumbling failures of their opposition. And as McMeekin shows, they were aided at nearly every step by countries like Germany, Sweden, and Switzerland who sought to benefit— politically and economically— from the chaotic changes overtaking the country." -- Provided by publisher. Full Article
m Churchill and Orwell : the fight for freedom / Thomas E. Ricks. By library.gcpl.lib.oh.us Published On :: "From #1 New York Times bestselling author Thomas E. Ricks, a dual biography of Winston Churchill and George Orwell, with a focus on the pivotal years from the mid-1930s through the 1940s, when their farsighted vision and inspired action in the face of the threat of fascism and communism helped preserve democracy for the world. Both George Orwell and Winston Churchill came close to death in the mid-1930's— Orwell shot in the neck in a trench line in the Spanish Civil War, and Churchill struck by a car in New York City. If they'd died then, history would scarcely remember them. At the time, Churchill was a politician on the outs, his loyalty to his class and party suspect. Orwell was a mildly successful novelist, to put it generously. No one would have predicted that by the end of the 20th century they would be considered two of the most important people in British history for having the vision and courage to campaign tirelessly, in words and in deeds, against the totalitarian threat from both the left and the right. Together, to an extent not sufficiently appreciated, they kept the West's compass set toward freedom as its due north. It's not easy to recall now how lonely a position both men once occupied. By the late 1930's, democracy was discredited in many circles, and authoritarian rulers were everywhere in the ascent. There were some who decried the scourge of communism, but saw in Hitler and Mussolini 'men we could do business with,' if not in fact saviors. And there were others who saw the Nazi and fascist threat as malign, but tended to view communism as the path to salvation. Churchill and Orwell, on the other hand, had the foresight to see clearly that the issue was human freedom— that whatever its coloration, a government that denied its people basic freedoms was a totalitarian menace and had to be resisted. In the end, Churchill and Orwell proved their age's necessary men. The glorious climax of Churchill and Orwell is the work they both did in the decade of the 1940'sto triumph over freedom's enemies. And though Churchill played the larger role in the defeat of Hitler and the Axis, Orwell's reckoning with the menace of authoritarian rule in Animal Farm and 1984 would define the stakes of the Cold War for its 50-year course, and continues to give inspiration to fighters for freedom to this day. Taken together, in Thomas E. Ricks's masterful hands, their lives are a beautiful testament to the power of moral conviction, and to the courage it can take to stay true to it, through thick and thin." -- Provided by publisher. Full Article