ow Designing tomorrow’s world: ETSI unveils strategy in line with its ambitious vision By www.etsi.org Published On :: Thu, 17 Dec 2020 13:13:55 GMT ‘Designing tomorrow’s world’: ETSI unveils strategy in line with its ambitious vision Sophia Antipolis, 3 December 2020 At the meeting of its General Assembly yesterday ETSI has validated a new strategy, the result of an intensive development process over the last months. Titled ‘Designing tomorrow’s world’, the strategy has been shaped by ETSI’s diverse global community, drawing on the expertise and experience of more than 900 member organizations that include multinational and smaller companies, start-ups, research organizations and governmental institutions. Read More... Full Article
ow ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability By www.etsi.org Published On :: Tue, 28 Sep 2021 14:29:46 GMT ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability Sophia Antipolis, 2 February 2021 The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence. Read More... Full Article
ow ‘Designing tomorrow’s world’: ETSI introduces its new strategy in line with its ambitious vision By www.etsi.org Published On :: Fri, 07 May 2021 12:23:36 GMT ‘Designing tomorrow’s world’: ETSI introduces its new strategy in line with its ambitious vision Sophia Antipolis, 5 May 2021 Today ETSI is pleased to introduce its new strategy, the result of an intensive development process over the last months, validated at the ETSI General Assembly in December 2020. Titled ‘Designing tomorrow’s world’, the strategy builds on a recognition of the global importance of Information and Communication Technology (ICT) for a sustainable development and to support the digital transformation of society. Read More... Full Article
ow ETSI NFV and MEC API 2021 testing event Report now available By www.etsi.org Published On :: Thu, 28 Apr 2022 13:54:04 GMT ETSI NFV and MEC API 2021 testing event Report now available Sophia Antipolis, 16 April 2021 The ETSI NFV&MEC API Plugtests™ 2021 event, which ran remotely during the whole month of February, allowed participants to self-evaluate the conformance of their API server implementations with network function virtualization and multi-access edge computing API specifications. The event allowed also to validate and gather feedback on ETSI NFV and MEC API and Conformance Testing Specifications, and associated Robot test suites. The full Report, including results, findings and lessons learnt is now available HERE. Read More... Full Article
ow ETSI unveils 2021 Fellows rewarding outstanding personal contribution By www.etsi.org Published On :: Wed, 01 Sep 2021 14:01:13 GMT ETSI unveils 2021 Fellows rewarding outstanding personal contribution. Sophia Antipolis, 22 April 2021 ETSI is pleased to unveil its 2021 ETSI Fellows. The Award committee composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General, nominated Dr. Gabrielle Owen, Mr. Charles Brookson, Ms. Nurit Sprecher, Dr.- Ing.Hans Wilhelm Gierlich and Dr. Jamshid Khun-Jush and Mr. Anthony Wiles as ETSI fellows for their outstanding personal contribution to ETSI. Read More... Full Article
ow ETSI virtual training on electronic signatures and trust services: register now! By www.etsi.org Published On :: Wed, 26 May 2021 13:42:39 GMT ETSI virtual training on electronic signatures and trust services: register now! Sophia Antipolis, 26 May 2021 The ETSI Technical Committee Electronic Signatures and Infrastructures (TC ESI) is organising a training on its standards on trust services and their use. This virtual event will take place on 1 June from 11:00 CEST to 15:00 CEST. Read More... Full Article
ow ETSI virtual Security Week 2021: recorded presentations now available By www.etsi.org Published On :: Fri, 29 Apr 2022 08:08:38 GMT ETSI virtual Security Week 2021: recorded presentations now available Sophia Antipolis, 25 June 2021 The ETSI Security Week 2021, that took place virtually from 14 June to 18 June, successfully closed with an audience of more than 1000 viewers joining from over 70 countries! Read More... Full Article
ow ETSI FRMCS Plugtests Report now available By www.etsi.org Published On :: Mon, 19 Jul 2021 07:28:09 GMT ETSI FRMCS Plugtests Report now available Sophia Antipolis, 5 July 2021 ETSI, with the support of the European Commission (EC), the European Free Trade Association (EFTA), the Critical Communications Association (TCCA) and the Union Internationale des Chemins de fer (UIC), released its Report following the FRMCS (Future Railway Mobile Communication System) Plugtests remote-only event which took place from 14 to 18 June 2021. Read More... Full Article
ow ETSI launches new White Paper titled Fibre Development Index: Driving Towards an F5G Gigabit Society By www.etsi.org Published On :: Wed, 22 Sep 2021 12:57:10 GMT ETSI launches new White Paper titled Fibre Development Index: Driving Towards an F5G Gigabit Society Sophia Antipolis, 19 August 2021 Fibre and fibre-based optical networks are the key technical enablers of our society's twin transitions (green and digital), providing sustainable and cost-effective communication with high bandwidth, stability, reliability, and improved latency. In addition, the fibre evolution enables sustainable economic growth through advanced services and applications for users, businesses, and industries. The new ETSI White Paper explains the methodology used to define a fibre development index, provides migration path recommendations to countries with different fibre development, and highlights the importance of setting policies to underpin that twin (green and digital) transformation. Read More... Full Article
ow Call for Nominations for ETSI Fellowship Awards By www.etsi.org Published On :: Wed, 01 Dec 2021 14:02:39 GMT Call for Nominations for ETSI Fellowship Awards Sophia Antipolis, 1 December 2021 The ETSI Fellowship Programme was established to honour and reward those individuals who have made an outstanding personal contribution to ETSI, to building the work of ETSI, or raising its reputation in specific sectors of standardization. This year, despite the challenges we all had to face due to the unpredictable sanitary situation, we should not forget about recognizing the outstanding contribution of our members’ peers through our ETSI Fellowship Programme. Read More... Full Article
ow ETSI Advanced Mobile Location standard now permits European smartphones to send caller location in emergency calls By www.etsi.org Published On :: Wed, 30 Mar 2022 13:14:21 GMT ETSI Advanced Mobile Location standard now permits European smartphones to send caller location in emergency calls Sophia Antipolis, 22 March 2022 Since 17 March all smartphones sold in Europe are required to comply with Advanced Mobile Location for emergency communications. AML was standardized in ETSI TS 103 625 by the ETSI technical committee on emergency communications (EMTEL) in December 2019. It is already helping emergency services dispatch the needed resources efficiently in Europe and worldwide. Read More... Full Article
ow ETSI unveils 2022 Fellows rewarding outstanding personal contribution By www.etsi.org Published On :: Wed, 06 Apr 2022 14:52:05 GMT ETSI unveils 2022 Fellows rewarding outstanding personal contribution Sophia Antipolis, 6 April 2022 ETSI is pleased to unveil its 2022 ETSI Fellows. The Award committee, composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General, unanimously nominated Dr. Diego López, Dr. Günter Kleindl, Mr. Larry Taylor and Mr. Lindsay Cornell as ETSI Fellows for their outstanding personal contributions to the organization. Read More... Full Article
ow ETSI launches a new open-source group: TeraFlowSDN By www.etsi.org Published On :: Tue, 31 May 2022 13:50:38 GMT ETSI launches a new open-source group: TeraFlowSDN Supporting autonomous networks and cybersecurity use cases Sophia Antipolis, 31 May 2022 Today, ETSI is pleased to announce the creation of a new open-source group called TeraFlowSDN. Based upon the results of the European Union-funded TeraFlow 5G PPP research project, this new group hosted by ETSI will provide a toolbox for rapid prototyping and experimentation with innovative network technologies and use cases. Read More... Full Article
ow Testing of trustworthy systems. Register now for the ETSI UCAAT event! By www.etsi.org Published On :: Mon, 25 Jul 2022 10:02:31 GMT Testing of trustworthy systems. Register now for the ETSI UCAAT event! Sophia Antipolis, 25 July 2022 The well-established UCAAT event addresses the practical challenges of testing and test automation faced by industry today. UCAAT 2022 will be hosted by Siemens in Munich on 13-15 September. Registration is now open. Join us! Read More... Full Article
ow ETSI Event: How to teach the Next Generation of ICT Standards People By www.etsi.org Published On :: Wed, 12 Oct 2022 07:07:33 GMT ETSI Event: How to teach the Next Generation of ICT Standards People Sophia Antipolis, 12 October 2022 On 6 October, ETSI organized its first workshop dedicated to present the full teaching material for ICT standardization, available from our website. The ETSI education about standardization programme started in 2016. This event was addressed to educators at university level and professionals. The audience comprised national standards organizations, university professors and Intellectual Property experts. Read More... Full Article
ow ETSI IoT week highlights how ICT standards can help sustainability By www.etsi.org Published On :: Mon, 17 Oct 2022 09:09:23 GMT ETSI IoT week highlights how ICT standards can help sustainability Sophia Antipolis, 17 October 2022 Last week ETSI hosted the 2022 ETSI IoT Week event, focused on “Pursuing the Digital and Green Transformation”. 52 speakers from industry, research, universities, cities and other SDOs demonstrated, with concrete examples, how ICT standards can help reach the UN Sustainable Development Goals (SDGs) and the European Green Deal to an audience from 22 countries around the world. Read More... Full Article
ow New ETSI specification allows single UICC to support the use of multiple applications simultaneously By www.etsi.org Published On :: Thu, 27 Oct 2022 09:48:19 GMT New ETSI specification allows single UICC to support the use of multiple applications simultaneously Sophia Antipolis, 26 October 2022 New specifications released by ETSI will enable multiple subscriptions and identities to exist in the same smartphone handset without needing several SIM cards to be within the device. The mobile telecom industry has been facing an increasing demand for applications running on mobile devices like banking, payments, transport and identity for some time. These new specifications address this demand by adding the possibility to host and address several "virtual secure elements" into the same UICC. This allows multiple virtual secure elements to coexist logically separated, whilst having the ability to be addressed independently through the same physical interface. Read More... Full Article
ow ETSI organizes the first TeraFlowSDN Hackfest during Network X in Amsterdam By www.etsi.org Published On :: Fri, 21 Oct 2022 06:56:46 GMT ETSI organizes the first TeraFlowSDN Hackfest during Network X in Amsterdam Sophia Antipolis, 21 October 2022 ETSI organized the first TeraFlowSDN Hackfest during the Network X event in Amsterdam, Netherlands, on 20 October. With the support of the European Commission (EC) and the European Free Trade Association (EFTA) the Hackfest brought together 25 developers eager to get a first hands-one experience with the software developed by TeraFlowSDN, the open source group created by ETSI in May this year. Read More... Full Article
ow ETSI TeraFlowSDN Winner of the Layer123 Network Transformation ‘Upstart of the Year’ Award By www.etsi.org Published On :: Wed, 07 Dec 2022 13:52:47 GMT ETSI TeraFlowSDN Wins Layer123 Network Transformation ‘Upstart of the Year’ Award Sophia Antipolis, 7 December 2022 The ETSI TeraFlowSDN group (ETSI TFS), launched only six months ago, has won the ‘Upstart of the Year’ award at the Layer123 Network Transformation Awards ceremony, held at the prestigious Berkley Hotel in Knightsbridge, London, last night. This award also recognizes the ETSI strategy to provide new software development tools and practices to an evolving standardization ecosystem. Read More... Full Article
ow ETSI launches second release of TeraFlowSDN, its open source Cloud-Native SDN Orchestrator and Controller for transport networks By www.etsi.org Published On :: Thu, 02 Feb 2023 09:05:55 GMT Sophia Antipolis, 2 February 2023 ETSI Open Source Group TeraFlowSDN has just announced the 2nd release of TeraFlowSDN controller, an innovative and robust SDN orchestrator and controller. Read More... Full Article
ow How cybersecurity standards support the evolving EU legislative landscape By www.etsi.org Published On :: Wed, 08 Feb 2023 13:57:55 GMT Sophia Antipolis, 8 February 2023 On 7 February, the European Standards Organizations (ESOs), CEN, CENELEC and ETSI, joined forces with ENISA, the European Union Agency for Cybersecurity, to organise their 7th annual conference. The hybrid conference took place at the Brussels Renaissance Hotel and focused on “European Standardization in support of the EU cybersecurity legislation”. Read More... Full Article
ow ETSI TeraFlowSDN to serve as reference implementation for TIP By www.etsi.org Published On :: Wed, 08 Mar 2023 11:51:16 GMT The implementation of Telecom Infra Project (TIP) Open Optical & Packet Transport (OOPT) Mandatory Use Case Requirements for SDN for Transport (MUST) in ETSI TeraFlowSDN cloud native SDN Controller will make it possible to accelerate network innovation in packet-optical networks. Sophia Antipolis, 22 February 2023 The ETSI TeraFlowSDN community has announced their commitment to the implementation of TIP’s Mandatory Use Case Requirements for SDN for Transport (MUST) Requirements in their innovative cloud native SDN Controller. This will position TeraFlowSDN as a reference implementation in the Telecom Infra Project Open Optical & Packet Transport group (TIP OOPT). This move will also make it possible to accelerate the adoption of SDN standards for IP/MPLS, Optical and Microwave transport technologies, which is one of the main objectives of MUST. Read More... Full Article
ow ETSI NG112 Emergency Communications remote Plugtests Report now available By www.etsi.org Published On :: Fri, 10 Mar 2023 14:42:38 GMT Sophia Antipolis, 10 March 2023 ETSI has just published the Report of the fifth NG112 remote Plugtests™ event, documenting an overall success rate of 100% of the executed tests carried out during the testing sessions. The interoperability event was organized in cooperation with the European Emergency Number Association (EENA), from 23 January to 3 February 2023 with the support of the ETSI Technical Committee Emergency telecommunications. Read More... Full Article
ow ETSI unveils 2023 Fellows at its 81th General Assembly By www.etsi.org Published On :: Fri, 31 Mar 2023 13:28:27 GMT Sophia Antipolis, 31 March 2023 ETSI is pleased to unveil its 2023 ETSI Fellows who were announced at the 81th ETSI General Assembly on 29 March. The award ceremony took place in the Fernand Leger museum, in Biot, near ETSI facilities in the South of France where art, science and technology mixed beautifully. Scott Cadzow, Hans Johansson and Robert Sarfati were unanimously nominated as ETSI Fellows for their outstanding personal contributions to the organization by the Award committee, composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General. Read More... Full Article
ow ETSI new White Paper on evolving NFV towards the next decade By www.etsi.org Published On :: Wed, 31 May 2023 12:40:15 GMT Sophia Antipolis, 30 May 2023 ETSI is pleased to publish its new White Paper on “Evolving NFV towards the next decade” written by delegates of the ETSI Industry Specification Group on Network Function Virtualization (ISG NFV). Read More... Full Article
ow New White Paper Explores ETSI TeraFlowSDN Alignment with TIP OOPT MUST Requirements By www.etsi.org Published On :: Sat, 30 Sep 2023 15:13:52 GMT Sophia Antipolis, 27 September 2023 The Telecom Infra Project (TIP) Open Optical & Packet Transport (OOPT) group is making significant strides in advancing network management and interoperability. Read More... Full Article
ow Aiming high: ETSI Conference on Non-Terrestrial Networks underlines critical role of NTN in realizing tomorrow’s global 6G vision By www.etsi.org Published On :: Tue, 16 Apr 2024 08:12:24 GMT Sophia Antipolis, 15 April 2024 This year’s first ETSI Conference on Non-Terrestrial Networks has stressed the importance of technical standardization in delivering a fully connected planet via NTN, a key element of tomorrow’s global 6G networks. Held from 3-4 April 2024 at ETSI’s Sophia Antipolis headquarters, the event was co-organized with the European Space Agency (ESA), the 6G Smart Networks and Services Industry Association (6G-IA) and the Smart Networks and Services Joint Undertaking (SNS JU). Titled ‘Non-Terrestrial Networks, a Native Component of 6G’, the 2-day conference attracted over 200 participants from 25 countries, including experts in standardization and research as well as industrial representation from the mobile, satellite and wider space industries. Delegates shared perspectives on NTN use cases, candidate technology solutions, current research status and standardization roadmaps. Day one sessions focused on the opportunities and challenges of integrating terrestrial and non-terrestrial networks within tomorrow’s global communications landscape. The second day afforded a deep dive into numerous cutting-edge NTN and 6G research & development initiatives in Europe and around the world. Read More... Full Article
ow ETSI unveils 2024 Fellows rewarding outstanding personal contribution By www.etsi.org Published On :: Fri, 19 Apr 2024 12:22:23 GMT Sophia Antipolis, 18 April 2024 ETSI is pleased to unveil its 2024 ETSI Fellows who were announced at the 83rd ETSI General Assembly on 16 April 2024.The Award Committee, composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General, unanimously named Dr. Howard Benn, Mr. Philippe Magneron, Dr. Matthias Schneider, Mrs. Isabelle Valet Harper and Mr. Dirk Weiler, as ETSI Fellows 2024 for their outstanding personal contributions to the organization. Read More... Full Article
ow TeraFlowSDN Release 3 Provides a Cloud-based Network Automation Platform Featuring New Optical SDN Controller and Expanded Support for Disaggregated Networks By www.etsi.org Published On :: Tue, 11 Jun 2024 15:19:13 GMT Sophia Antipolis, 30 April 2024 The ETSI TeraFlowSDN community is proud to announce the third release of TeraFlowSDN, an innovative and robust SDN orchestrator and controller, delivering a fully featured Network Automation Platform. In this latest release, TeraFlowSDN enhances its capabilities with the integration of an Optical SDN controller, expanding device support to include gNMI and OpenConfig protocols. It also features enriched network integrations for end-to-end orchestration like IP over DWDM, L3VPN, MEC, and network topology exposure. The management of network topologies is improved with the addition of a new BGP-LS speaker able to discover the topologies, and a new Forecaster component is introduced, providing predictive insights for network management. These additions substantially augment the versatility and management capabilities of the TeraFlowSDN platform. Read More... Full Article
ow ETSI NFV Release 5 (Version 5.1.1) is now available! By www.etsi.org Published On :: Thu, 05 Sep 2024 14:09:20 GMT Sophia Antipolis, 5 September 2024 The ETSI Industry Specification Group for Network Functions Virtualization (ISG NFV) has just published its specifications of Release 5 first drop as version 5.1.1. Read More... Full Article
ow ETSI announces TeraFlowSDN Release 4 By www.etsi.org Published On :: Wed, 06 Nov 2024 13:35:29 GMT Sophia Antipolis, 6 November 2024 End-to-end Network Automation and Security Framework Read More... Full Article
ow MAA Ottawa: Axe Throwing with Ottawa's Alumni By www.alumni.mcgill.ca Published On :: Wed, 31 Dec 1969 19:00:00 -0500 Starts: Wed, 13 Nov 2024 19:00:00 -050011/13/2024 05:30:00PMLocation: Ottawa, Canada Full Article
ow MAA France: Fall All-Canadian Bowling Night for McGillians By www.alumni.mcgill.ca Published On :: Wed, 31 Dec 1969 19:00:00 -0500 Starts: Thu, 14 Nov 2024 22:00:00 -050011/14/2024 07:30:00PMLocation: PARIS, Canada Full Article
ow How to Read a Slave Narrative By nationalhumanitiescenter.org Published On :: Tue, 16 Mar 2010 11:56:18 -0400 New essay by William L. Andrews just added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center. Full Article
ow How Slavery Affected African American Families By nationalhumanitiescenter.org Published On :: Tue, 27 Jul 2010 14:11:14 -0400 New essay, "How Slavery Affected African American Families," by Heather Andrea Williams, associate professor of history at the University of North Carolina at Chapel Hill, added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center. Full Article
ow Senior Research Fellow I/II By phf.tbe.taleo.net Published On :: Thu, 12 Sep 2024 19:29:22 GMT Job Summary: The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Senior Research Fellow (SRF I or SRF II) for a two-year, renewable appointment for its Nutrition, Diets and Health Unit. This position is based at IFPRI headquarters located in Washington, D.C but would involve travel to any of the countries in which IFPRI carries out its research. The SRF I/II would manage complex, multi-partner surveys and evaluations, mentor junior research staff, lead the development of new research activities, including developing proposals for the evaluation of multisectoral programs and food systems approaches to improving diet, nutrition and health outcomes in low- and middle-income countries. In addition, the SRF I/II would lead research activities related to the CGIAR Research Initiative on Fruit and Vegetables for Sustainable Healthy Diets (FRESH) which would include leading the co-development of programmatic activities (with program implementation partners) to increase intake of fruit and vegetables. Essential Duties: Specific duties include but are not limited to: Conducting research related to diets, nutrition, health, and well-being in low-and middle-income countries and the impact of multisectoral programs and/or food systems approaches on these types of outcomes. Developing and managing large/complex research projects and/or programs including developing workplans, coordinating research activities, monitoring and reporting on progress and sharing research findings with diverse audiences. Design and supervise large-scale data collection activities such as household surveys, food environment surveys, dietary assessment surveys and nutritional status assessments. Supervising the work of various research support staff and providing professional mentoring to others. As part of multisectoral program and/or food systems evaluation activities, work closely with program implementation partners and other key stakeholders, to identify and oversee the design of programmatic activities to address constraints to sustainable, healthy diets. Recruiting and managing national collaborators. Developing and monitoring of the project or program budget. Publishing research in peer-reviewed publications. Providing strong research leadership in developing new ideas into proposals. Preparing donor and other project/program reports. Liaising with donor & senior government and other types of stakeholders on projects Communicating research to a broad spectrum of stakeholders (researchers, academicians, policy makers, local partners. Required Qualifications: At the Senior Research Fellow I level: PhD in Nutrition, Public Health, Epidemiology, International Development, or closely related field and a minimum of 7 years of post-PhD experience. At the Senior Research Fellow II level: PhD in Nutrition, Public Health, Epidemiology, International Development, or closely related field and a minimum of 10 years of post-PhD experience Major external recognition within peer professional network due to publications and other leaderships activities. Extensive publication record in peer-reviewed journals. Strong skills in quantitative data analysis Demonstrated ability to perform critical analyses of own & others’ research. Sustained and consistent excellent publications record in peer-reviewed journals. Demonstrated leadership skills and strong experience building and managing teams. Demonstrated leadership in developing global research programs with policy recommendations. Demonstrated experience in effective interactions in a multicultural setting with other researchers and with policymakers, donors, and civil society, facilitating impact of research & capacity strengthening. The ability to effectively contribute to IFPRI’s overall institutional value through demonstrated participation and support for organization-wide programs and activities. Willingness to travel extensively as required. Excellent written and spoken English communication skills with demonstrated excellence in written and oral presentations. Demonstrated computer literacy (PC and Microsoft Applications). Proven record of fundraising success for broad and complex programs and projects. Preferred Qualifications: Proficiency in a second language of the U.N. system Dietary assessment and analysis expertise Experience with qualitative assessment methods and associated analytic techniques and software. Physical Demand and Work Environment: Employee will sit in an upright position for a long period of time. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range : The expected salary ranges for this job requisition are between 24 R : $135,400 - $169,300 ; 25 R: $159,800 - $199,700 . In determining your salary, we will consider your experience and other job-related factors. Benefits IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing a strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US based employees who work at least 25 hours per week. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity. Full Article
ow Associate Research Fellow / Research Fellow By phf.tbe.taleo.net Published On :: Thu, 17 Oct 2024 14:57:57 GMT Job Summary The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as an Associate Research Fellow or Research Fellow. This is a two-year, renewable, exempt appointment based at IFPRI’s Washington, DC Office. The ideal candidate will have demonstrated aptitude with modeling water resources and hydrologic systems at multiple scales, experience in developing and operating modeling suites that link biophysical and economic models, and interest/experience in the analysis of risk and uncertainty. The successful candidate will work on interdisciplinary teams to conduct research, produce high-impact publications and disseminate knowledge that (for example): assists national level policy-making units confront the challenges posed by climate change and water constraints; fosters regional strategies for resilient growth and development in a context of climate change; works with CGIAR partners on research and/or model development, particularly in IWMI; and assists key agri-food system actors in low- and middle-income countries (LMICs) and other constituencies in the formation of investment plans in water resources, including in relation to food and energy. Specific areas of research are expected to be developed in accordance with the intersection of the interests and skills of the successful candidate and the objectives of the Foresight and Policy Modeling Unit. It is anticipated that about 80 percent of the job will be dedicated to applied research, and the remaining 20 percent will be allocated to capacity-building, policy engagement, and outreach activities supporting evidence-based decision-making. Essential Duties Specific duties include but are not limited to: · Lead development, maintenance, and improvement of IFPRI’s water data and modeling systems compatible with global (IMPACT) and national levels (RIAPA). · Contribute to scenario development, modeling and analytics supporting a variety of foresight-related research projects. · Lead focused studies on water-related issues relevant for food system transformation globally and in LMICs. · Work with other modelers in the Foresight and Policy Modeling unit to maintain and improve water modeling components of established modeling frameworks. · Conduct research in the service of the CGIAR’s mission to advance positive transformation of food, land, and water systems. · Support efforts to strengthen the capacity of partner organizations and networks to conduct scholarly research and communicate evidence-based policy recommendations. · Prepare project reports, research papers, presentations, and peer-reviewed journal articles in collaboration with CGIAR researchers, other collaborators, and partners. · Regularly communicate research outputs via policy seminars, policy briefs, and peer-reviewed publications to a broad spectrum of stakeholders, including researchers, academics, policymakers, and government officials. · The successful candidate will work with a multi-disciplinary and multi-cultural team of researchers and is expected to engage in a broad range of research projects and activities consistent with the research program of the Foresight and Policy Modeling Unit. Required Qualifications · PhD in Water Resources Engineering, Hydrology, or closely related field · Significant expertise in using water resources systems and hydrologic models and experience or interest to link these to economic and other simulation models at global, regional and national levels to evaluate policies related to food, land, and water systems. · Demonstrated capabilities in quantitative analysis and ability to use spatial data and methods in innovative and policy-relevant ways to examine water resource management issues in the context of climate change and other major drivers. · Ability or willingness to work in the GAMS modeling environment and code, other math/statistical programming languages, and GIS. · Experience using river basin modeling tools, (e.g. Mike Hydro Basin, WEAP, and Riverware). · Strong interpersonal skills and ability to work well both with a team and independently. · Ability to work in a dynamic environment, take initiatives to resolve issues and effectively work with minimal supervision. · Excellent written and verbal communication skills in English. · Willingness to travel extensively (including internationally) as required. Preferred Qualifications · Ability to work in Python. · Relevant research experience as applied to LMIC country contexts in Africa, Asia, and/or Latin America. · Demonstrated ability to produce high-quality written reports, oral presentations, blog posts, and/or other forms of written and oral communications associated with scholarly research outputs. Additional requirements at the Research Fellow level · At least 3 years of post-PhD experience relevant to the job and demonstrated fundraising experience. · Strong publication record in peer-reviewed journals. · Major external recognition within professional peer network based on publications and other leadership activities. · Demonstrated leadership skills and successful experience building and managing teams. Physical Demand & Work environment · Employee will sit in an upright position for a long period of time · Employee will lift between 0-10 pounds. · Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range : The expected salary range for this job requisition is between $85,600 - $107,000. In determining your salary, we will consider your experience and other job-related factors. Benefits : IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US-based employees who work at least 25 hours per week. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity. Full Article
ow SpotOn London 2013: How are online tools changing science education? By www.nature.com Published On :: Thu, 07 Nov 2013 14:08:14 +0000 The place we’re in as a society is a crowded field of scattered tools and Full Article Featured Guest Posts SpotOn London (#SoLo) Tools
ow How does agricultural productivity growth affect agrifood system transformation goals? By www.youtube.com Published On :: Tue, 9 Jul 2024 16:46:57 GMT Full Article
ow How should governments respond to crises? Rapid response using RIAPA modeling system By www.youtube.com Published On :: Tue, 13 Aug 2024 20:58:25 GMT Full Article
ow Empowering Women: Inclusion in India's Government Planning (Short Version) By www.youtube.com Published On :: Tue, 20 Aug 2024 15:27:07 GMT Full Article
ow Empowering Women: Inclusion in India's Government Planning (Odia Subtitles) By www.youtube.com Published On :: Fri, 23 Aug 2024 21:55:19 GMT Full Article
ow How To Protect Your Cloud Environments and Prevent Data Breaches By www.tenable.com Published On :: Thu, 24 Oct 2024 09:00:00 -0400 As organizations create and store more data in the cloud, security teams must ensure the data is protected from cyberthreats. Learn more about what causes data breaches and about the best practices you can adopt to secure data stored in the cloud.With the explosion of data being generated and stored in the cloud, hackers are creating new and innovative attack techniques to gain access to cloud environments and steal data. A review of recent major data breaches shows us that data thieves are using social engineering, hunting for exposed credentials, looking for unpatched vulnerabilities and misconfigurations and employing other sophisticated techniques to breach cloud environments.A look at recent cloud data-breach trendsHere are some takeaways from major data breaches that have occurred this year:Managing the risk from your third-parties – partners, service providers, vendors – has always been critical. It’s even more so when these trusted organizations have access to your cloud environment and cloud data. You must make sure that your third-parties are using proper cloud-security protections to safeguard their access to your cloud data and to your cloud environment.Secure your identities. We’ve seen major data breaches this year tracked down to simple missteps like failing to protect highly-privileged admin accounts and services with multi-factor authentication (MFA). Adopt best practices to prevent ransomware attacks, and to mitigate them if you get hit by one. Ransomware gangs know that a surefire way to pressure victims into paying ransoms is to hijack their systems and threaten to expose their sensitive data. So, how can you strengthen your data security posture against these types of attacks?Implement a "zero trust" security framework that requires all users, whether inside or outside the organization, to be authenticated, authorized and continuously validated before being granted or maintaining access to data. This framework should allow only time-limited access and be based on the principle of least privilege, which limits access and usage to the minimum amount of data required to perform the job.Use a cloud data security posture management (DSPM) solution to enforce the security framework through continuous monitoring, automation, prioritization and visibility. DSPM solutions can help organizations identify and prioritize data security risks based on their severity, allowing them to focus their resources on the most critical issues.Regularly conduct risk assessments to detect and remediate security risks before they can be exploited by hackers. This can help prevent data breaches and minimize the impact of any security incidents that do occur.Train employees on security best practices, including how to create strong passwords, how to identify risks and how to report suspicious activity.By following these recommendations, organizations can significantly reduce their risk of a data breach and improve handling sensitive data belonging to their organization. As more and more data moves to the cloud and hackers become more sophisticated, it's essential to prioritize security and take proactive measures to protect against data risks. Learn moreWebinar: Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?Data Sheet: Data Security Posture Management (DSPM) Integrated into Tenable Cloud SecurityData Sheet: Securing AI Resources and Data in the Cloud with Tenable Cloud SecurityInfographic: When CNAPP Met DSPMVideo: Demo Video: Data Security Posture Management and AI Security Posture Management Full Article
ow Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates By www.tenable.com Published On :: Fri, 25 Oct 2024 09:00:00 -0400 Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.Dive into six things that are top of mind for the week ending Oct. 25.1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.The white paper covers shadow AI topics including:Creating a comprehensive inventory of AI systemsConducting gap analyses to spot discrepancies between approved and actual AI usageImplementing ways to detect unauthorized AI waresEstablishing effective access controlsDeploying monitoring techniques “By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:The asset’s descriptionInformation about its AI modelsInformation about its data sets and data sourcesInformation about the tools used for its development and deploymentDetailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standardsRecords of its access control mechanismsShadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.To get more details, read:The full “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paperA complementary slide presentationThe CSA blog “Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape”For more information about AI security issues, including shadow AI, check out these Tenable blogs:“Do You Think You Have No AI Exposures? Think Again”“Securing the AI Attack Surface: Separating the Unknown from the Well Understood”“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach”“6 Best Practices for Implementing AI Securely and Ethically”“Compromising Microsoft's AI Healthcare Chatbot Service”2 - Best practices for secure software updatesThe security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.”“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.To get more details, read:The “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers” guideThe CISA alert “CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes”For more information about secure software updates:“Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design” (Tenable)“The critical importance of robust release processes” (Cloud Native Computing Foundation)“Software Deployment Security: Risks and Best Practices” (DevOps.com)“Software Updates, A Double-Edged Sword for Cybersecurity Professionals” (Infosecurity)“DevOps Best Practices for Faster and More Reliable Software Delivery” (DevOps.com)3 - Report: GenAI, attack variety, data security drive cyber strategiesWhat issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.To get more details, read:The report’s announcement “Cybersecurity success hinges on full organizational support, new CompTIA report asserts”CompTIA’s blogs “Today’s top drivers for cybersecurity strategy” and “Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report”The full “State of Cybersecurity 2025” reportFor more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” (on-demand webinar)“The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy” (blog)“Mitigating AI-Related Security Risks” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)4 - CISA lists software dev practices most harmful for securityRecommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added. Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:Using programming languages considered “memory unsafe”Including user-provided input in SQL query stringsReleasing a product with default passwordsReleasing a product with known and exploited vulnerabilitiesNot using multi-factor authenticationFailing to disclose vulnerabilities in a timely mannerAlthough the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.To get more details, check out:CISA’s announcement “CISA and FBI Release Product Security Bad Practices for Public Comment”The full document “Product Security Bad Practices”For more information about how to develop secure software:“Tenable Partners with CISA to Enhance Secure By Design Practices” (Tenable)“Ensuring Application Security from Design to Operation with DevSecOps” (DevOps.com)“What is application security?” (TechTarget)“Guidelines for Software Development (Australian Cyber Security Centre)5 - New EU law focuses on cybersecurity of connected digital productsMakers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars. For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:Aren’t shipped with known exploitable vulnerabilitiesFeature a “secure by default” configurationCan fix their vulnerabilities via automatic software updatesOffer access protection via control mechanisms, such as authentication and identity managementProtect the data they store, transmit and process using, for example, at-rest and in-transit encryption“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.For more information and analysis about the EU’s Cyber Resilience Act:“Cyber Resilience Act Requirements Standards Mapping” (ENISA)“The Cyber Resilience Act, an Accidental European Alien Torts Statute?” (Lawfare)“EU Cybersecurity Regulation Adopted, Impacts Connected Products” (National Law Review)“Open source foundations unite on common standards for EU’s Cyber Resilience Act” (TechCrunch)“The Cyber Resilience Act: A New Era for Mobile App Developers” (DevOps.com)VIDEOThe EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 6 - UK cyber agency: CISOs must communicate better with boardsCISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.”As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.”“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.Here’s a small sampling of the advice:Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.Aim to provide a holistic view, and avoid using technical jargon.Aim to advise instead of to educate. Full Article
ow Securing Financial Data in the Cloud: How Tenable Can Help By www.tenable.com Published On :: Mon, 04 Nov 2024 09:00:00 -0500 Preventing data loss, complying with regulations, automating workflows and managing access are four key challenges facing financial institutions. Learn how Tenable can help.Imagine a bustling bank, made not of bricks and mortar, but of a swirling mass of data in the cloud. Account numbers, transaction histories and personally identifiable information (PII) zip across servers, powering the financial world. Holding all this sensitive data requires tremendous care. Therefore, securing this sensitive information is paramount.This is where Tenable Cloud Security steps in, offering a data security shield specifically designed for the unique needs of financial institutions.The challenge: A data deluge demands vigilanceFinancial institutions generate massive volumes of data daily. While the public cloud offers unparalleled capacity to store such data, along with agility and scalability, the cloud also expands the attack surface. Legacy cybersecurity solutions are often unable to manage — let alone secure — the sheer volume of data and the variety of ways it is accessed, leaving organizations exposed to malicious actors. At the same time, financial institutions must keep up with new and evolving compliance standards and regulations set forth by governing bodies. Financial institutions need a security platform that helps them protect their data and maintain compliance.Tenable Cloud Security’s advantage: Seeing beyond the wallsTenable Cloud Security actively scrutinizes every corner of the cloud data vault, continuously and automatically."Without [Tenable Cloud Security], we would've been virtually blind to risks and threats impacting our sensitive data. [Tenable Cloud Security] allows us to preempt any issues and meet the requirements we're receiving from our business partners, with minimal effort.— VP Security at a leading Fintech platformHere's how Tenable empowers financial institutions:Protecting sensitive data: Tenable doesn't just guard the door; it knows what's inside and how to best protect it. It identifies and labels all data, like financial records and social security numbers, understanding its sensitivity and prioritizing its protection.Continuous monitoring: Imagine guards constantly scanning every inch of the vault. Tenable does the same digitally, using advanced technology to constantly search for suspicious activity and potential breaches. Any unusual movement of the data, either exfiltration or copying to a different and inaccessible location, triggers an alarm, allowing for immediate intervention.Policy enforcement: Just like a vault needs clear access protocols, so does your data. Tenable automates setting and enforcing cybersecurity policies across the entire cloud, ensuring everyone plays by the book and no unauthorized hands touch the valuables.Following mandated regulations: Financial institutions juggle a complex set of regulations and industry standards like the Payment Card Industry Data Security Standard (PCI-DSS). Tenable simplifies compliance with a host of international regulations by providing timely reports and audit trails.Beyond traditional security: More than just a lockModern technology stacks for data storage require a modern cybersecurity stack. Traditional security solutions are unable to address the unique risks associated with storing data in cloud technologies. Financial organizations that leverage Tenable’s data security platform are able to meet existing and future challenges, including:Preventing data loss: Early detection and prevention of unauthorized data access can help organizations minimize financial losses and reputational damage, keeping valuable assets safe from even the most cunning thieves.Complying with regulations: Automated reports and adherence to the most stringent regulations and industry standards ensure compliance, saving time and resources.Automating workflows: Tenable automates tasks and provides deeper insights into how data behaves, enabling organizations to free up their valuable resources for other endeavors and make their security teams more efficient.Managing access: Just like knowing who has access to the vault is crucial. Tenable tracks who and what has access to data, ensuring only authorized parties can handle the data.The future of financial security is data-centricTenable Cloud Security's data-centric approach positions it as a valuable partner, not just for guarding the perimeter but for understanding the inner workings of the vault and the most sensitive data within it. By leveraging Tenable’s capabilities, financial institutions can confidently embrace the cloud while ensuring the highest level of security for their most valuable assets — their data.To learn more about how you can secure your dataWebinar: Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?Data Sheet: Data Security in a Unified Cloud Security SolutionInfographic: When CNAPP met DSPMDemo Video Full Article
ow Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources By www.tenable.com Published On :: Fri, 08 Nov 2024 09:00:00 -0500 CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.Dive into six things that are top of mind for the week ending Nov. 8.1 - CISA: Beware of nasty spear-phishing campaignProactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads. Other CISA recommendations include:Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFAEducate users on how to spot suspicious emailsHunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and proceduresAlthough CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.”For more information about securing RDP tools:“Commonly Exploited Protocols: Remote Desktop Protocol (RDP)” (Center for Internet Security)“What is remote desktop protocol (RDP)?” (TechTarget)“Wondering Whether RDP IS Secure? Here's a Guide to Remote Desktop Protocol” (AllBusiness)“Why remote desktop tools are facing an onslaught of cyber threats” (ITPro)“'Midnight Blizzard' Targets Networks With Signed RDP Files” (Dark Reading)2 - OWASP issues AI security resourcesHow should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project. The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.These are the new resources:“The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:preparationdetection and analysiscontainment eradication and recoverypost-incident activity“The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:Generative AI security policiesRisk assessment and management processesTraining and awarenessResearch and development“The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”For more information about protecting your organization against deepfakes:“How to prevent deepfakes in the era of generative AI” (TechTarget)“Deepfake scams escalate, hitting more than half of businesses” (Cybersecurity Dive)“The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks” (SecurityWeek)“How deepfakes threaten biometric security controls” (TechTarget)“Deepfakes break through as business threat” (CSO)3 - Fake update variants dominate list of top malware in Q3Hackers are doubling down on fake software-update attacks.That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.Here’s the full list, in descending order:SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updatesClearFake, another JavaScript downloader used for fake browser-update attacksZPHP, another JavaScript downloader used for fake software-update attacksAgent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshotsCoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functionsMirai, a malware botnet that compromises IoT devices to launch DDoS attacksNanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheetLumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking informationTo get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.For details on fake update attacks:“Fake browser updates spread updated WarmCookie malware” (BleepingComputer)“Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware” (The Hacker News)“Hackers Use Fake Browser Updates for AMOS Malware Attacks Targeting Mac Users” (MSSP Alert)“Malware crooks find an in with fake browser updates, in case real ones weren't bad enough” (The Register)“Fake Google Chrome errors trick you into running malicious PowerShell scripts” (BleepingComputer)VIDEOFake Chrome Update Malware (The PC Security Channel)4 - CISA’s first international plan unveiledCISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructureBoost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreatsUnify the coordination of international activities to strengthen cyberdefenses collectivelyThe plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.5 - Interpol hits phishers, ransomware gangs, info stealersInterpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.For more information about global cybercrime trends:“AI-Powered Cybercrime Cartels on the Rise in Asia” (Dark Reading)“AI Now a Staple in Phishing Kits Sold to Hackers” (MSSP Alert)“The Business of Cybercrime Explodes” (BankDirector)“Nation state actors increasingly hide behind cybercriminal tactics and malware” (CSO)6 - IST: Ransomware attacks surged in 2023Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. “Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.Global Ransomware Incidents in 2023Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.To learn more about ransomware trends:“Ransomware Is ‘More Brutal’ Than Ever in 2024” (Wired)“Ransomware on track for record profits, even as fewer victims pay” (SC Magazine)“How Can I Protect Against Ransomware?” (CISA)“How to prevent ransomware in 6 steps” (TechTarget)“Steps to Help Prevent & Limit the Impact of Ransomware” (Center for Internet Security) Full Article
ow OSC announces $150,000 award to international whistleblower By www.osc.ca Published On :: Wed, 23 Oct 2024 13:03:00 GMT TORONTO – The Ontario Securities Commission (OSC) has issued an award of nearly $150,000 to an international whistleblower who provided information about significant issues at an early-stage firm. Full Article
ow SpotOn London 2012 Storify: Fixing the fraud: how do we safeguard science from misconduct? By www.nature.com Published On :: Wed, 14 Nov 2012 12:00:49 +0000 #solo12fraud Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12fraud
ow SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber? By www.nature.com Published On :: Wed, 14 Nov 2012 14:55:52 +0000 Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits. Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12funding
ow SpotOn London 2012 Storify: Tackling the terabyte: how should research adapt to the era of big data? By www.nature.com Published On :: Wed, 21 Nov 2012 15:09:37 +0000 Here is a Storify round up of the SpotOn London session: Tackling the terabyte: how should Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12tera