ow

SpotOn London 2013 Storify: Open, Portable, Decoupled – How should Peer Review change?

Here is a Storify collating the online conversation around the Open, Portable, Decoupled – How should




ow

Fire power. Volume 3, Flame war / Robert Kirkman, creator, writer ; Chris Samnee, creator, artist ; Matt Wilson, colorist ; Rus Wooton, letterer.

"The one who wields the fire power is destined to save the world, but Owen Johnson has turned his back on that life. But after the Dragon's Claw's attack, Owen and his family are reeling from the loss— and more danger lurks on the horizon!" -- Description provided by publisher.




ow

SpotOn London Storify: How are online tools changing science education?

Here is a Storify collecting the online conversations from the “How are online tools changing




ow

How to get a ticket for this year’s SpotOn London

With a month to go, we’ve been busy behind the scenes planning for this year’s




ow

SpotOn London 2013: Open, Portable, Decoupled – How should Peer Review change?

At this year’s SpotOn London, one of the most popular and widely tweeted sessions organised




ow

Towards 2035: Common Prosperity and Urban-Rural Poverty Management System [in Chinese]

In 2021, General Secretary Xi Jinping solemnly declared that China's poverty alleviation battle has achieved a comprehensive victory. However, there is still a long way to go to solve the problem of unbalanced and insufficient development, narrow the development gap between urban and rural areas, and achieve comprehensive human development and common prosperity for all people.




ow

The Switch Sandra Brown.

From #1 New York Times bestselling author Sandra Brown comes another masterful creation, a riveting novel of suspense, revenge, and unpredictable twists and turns...When Melina suggests that her twin sister Gillian take her place as a media escort to an astronaut, she initially refuses. The following morning Melina is horrified to learn that her sister has been murdered. Now she must work together to learn the truth behind her sister's death, and discover the identity of the killer, whose plans are far from over.




ow

Where There's Smoke Sandra Brown.

When she returns home to start a new medical practice, Lara finds she can't escape her troubled past to open up her medical practice after all these years. Soon she finds herself in the sights of a powerful oil executive who wants nothing more than to be rid of Lara. Lara decides to find the truth behind the corruption and secrets in town- even if it could cost her everything.




ow

The Witness Sandra Brown.

The best public defender in Prosper, Kendall has stumbled upon the town's chilling secret - and her marriage to one of the town's most powerful men has become a living hell. Now Kendall is a terrified mother trying to save her child's life.




ow

The Alibi Sandra Brown.

Assistant DA Hammond Cross has his sights set on the DA's office. Prosecuting a high-profile murder case practically ensures him the job. But a Saturday night encounter with a mysterious woman is the start of a living nightmare.




ow

Standoff Sandra Brown.

An ambitious female television reporter is driving through New Mexico when she hears that a Texas millionarie's teenage daughter has been kidnapped. Knowing the girl's father lives nearby, she quickly lines up an interview. The situation quickly spins out of control, however, and the reporter finds herself at the center of a tense situation that could have devastating consequences for all involved.




ow

Exclusive Sandra Brown.

#1 New York Times bestselling author Sandra Brown weaves a tale of murder, passion, and intrigue in the pristine corridors of the White House. Barrie Travis is not famous: she's just a damn good reporter stuck at a low-budget television station. Then, her old friend and now First Lady calls her to investigate the supposed SIDS death of her baby. Stunned by grief after the loss of her infant son, the President's wife hints that her child may have murdered. Blind to everything but finding the truth, Barrie delves into the private lives of the president and his wife and uncovers dark and terrible secrets that will test her ethics, her patriotism, and her courage. With the help of Gray Bondurant, a mysterious former presidential aide, this story could topple the presidency and change the course of history. In this fast-moving political thriller, Barrie must fight powerful forces that want nothing more than to see the scandalous past-and a certain young reporter-dead and buried.




ow

Charade Sandra Brown.

A medical miracle gives TV personality Cat Delaney more than a new heart. With her second chance at life Cat trades Hollywood for San Antonio, where she hosts a TV show for children with special needs. Here she meets Alex Pierce, an ex-cop turned crime writer-and the first man to see her as a woman since her surgery. But her new world turns sinister when fatal "accidents" begin killing other heart recipients, and a mysterious stalker starts shadowing her every move. Soon Cat realizes Alex may-or may not-be her most important ally and that her new heart comes at a terrible price: a tangled web of secrets and someone determined to take her life.




ow

Unspeakable Sandra Brown.

Carl Herbold is a cold-blooded psychopath who has just escaped the penitentiary where he was serving a life sentence. Bent on revenge, he's going back to where he began--Blewer County, Texas... Born deaf, lately widowed, Anna Corbett fights to keep the ranch that is her son's birthright, unaware that she is at the center of Herbold's horrific scheme--and that her world of self-imposed isolation is about to explode... Drifter Jack Sawyer arrives at Anna's ranch asking for work, hoping to protect the innocent woman and her son from Herbold's rage. But Sawyer can't outrun the secrets that stalk him--or the day of reckoning awaiting them all...




ow

Mirror Image Sandra Brown.

A master of romantic suspense, Sandra Brown spins an action-packed tale of mistaken identity, political intrigue, and assassination. The crash of a Dallas-bound jet wasn't just a tragedy for TV reporter Avery Daniels; it was an act of fate that handed her a golden opportunity to further her career, but made her the crucial player in a drama of violent passions and deadly desires. After plastic surgery transforms her face, Daniels is mistaken for a glamorous, selfish woman named Carole Rutledge-wife of the famous senatorial candidate Tate Rutledge who is a member of a powerful Texas dynasty. As she lay helpless in the hospital, Daniels made a shattering discovery: Someone close to Tate planned to assassinate him. Now, to save Tate's life, Avery must live another woman's life-and risk her own...




ow

The Crush Sandra Brown.

As a surgeon, Dr. Rennie Newton is the consummate professional. When she's summoned to jury duty, she brings to the courtroom the same level of competence and composure that she displays in the operating room. It is this commitment to precision that compels her to deliver a not guilty verdict in the murder case against notorious contract killer Ricky Lozada. It will be the most regrettable decision of her life... because Rennie's trial with Lozada doesn't end with his acquittal. Her carefully structured life begins to crumble when a rival colleague is brutally slain. Lozada's menacing shadow looms over the murder, but it's Rennie the investigators focus on as the prime suspect. The privacy she has cultivated and protected at all costs is violated by the police as well as Lozada. And when he begins an earnest courtship, insinuating himself into every aspect of her life, it becomes terrifyingly clear that he is obsessed with having her. Wick Threadgill is a detective on indefinite leave from the Fort Worth PD, who has his own personal agenda for the contract killer. Temperamental, bitter, and driven by loyalty and love, Wick is determined to destroy Lozada...as determined as Lozada is to possess Rennie Newton. In order to defeat Lozada-and save their lives-Rennie and Wick form an uneasy alliance. Mistrustful of each other, they know only one thing with absolute certainty-like one of Lozada's prize scorpions, when this killer strikes, they won't see it coming. The Crush will take you on a tortuous path through a twisted sociopath's eerie obsession, a haunted man's fragile hopes for redemption, and a woman's heart as she struggles to face her greatest fear-to open herself to love.




ow

Fat Tuesday Sandra Brown.

A police officer is furious that his partner's murderer was acquitted. In a desperate act of revenge, he kidnaps the defense attorney's wife. Who will find redemption in this story of corruption and passion?




ow

Shadow Woman A Novel Linda Howard.

NEW YORK TIMES BESTSELLER • From Linda Howard comes a thrilling and sensual new novel of romance, suspense, intrigue . . . and memories that can kill. Lizette Henry wakes up one morning and makes a terrifying discovery: She doesn't recognize the face she sees in the mirror. She remembers what she looks like, but her reflection is someone else's. To add to the shock, two years seem to have disappeared from her life. Someone has gone to great and inexplicable lengths to keep those missing years hidden forever. But the past always finds a way to return. Strange memories soon begin to surface and, along with them, some unusual skills and talents that Lizette hasn't a clue about acquiring. Sensing that she's being monitored, Lizette suddenly knows how to search for bugs in her house and tracking devices in her car. What's more, she can elude surveillance-like a trained agent. Enter a mysterious and seductive stranger named Xavier, who claims he wants to help-but who triggers disturbing images of an unspeakable crime of which Lizette may or may not be the perpetrator. With memories returning, she suddenly becomes a target of anonymous assassins. On the run with nowhere to hide, Lizette has no choice but to rely on Xavier, a strong and magnetic man she doesn't trust, with a powerful attraction she cannot resist. As murky waters become clear, Lizette confronts a conspiracy that is treacherous and far-reaching and a truth that, once revealed, may silence her and Xavier once and for all.




ow

The final vow / Amanda Flower.

"Kelsey Cambridge, director of the Barton Farm living history museum, must save the Farm's reputation when a wedding planner is pushed from the bell tower of the Farm's picturesque church"-- Provided by publisher.




ow

A hiss before dying : a Mrs. Murphy mystery / Rita Mae Brown & Sneaky Pie Brown ; illustrated by Michael Gellatly.

"Rita Mae Brown and her feline co-author Sneaky Pie Brown are back chasing mystery with their unique circle of Southern sleuths. And though the changing colors of fall are a beauty to behold, this year the scattered leaves hide a grim surprise. Autumn is in the air in the Blue Ridge Mountain community of Crozet, Virginia--and all the traditions of the changing seasons are under way. Mary Minor "Harry" Haristeen cleans her cupboards, her husband, Fair, prepares the horses for the shorter days ahead, and the clamorous barking of beagles signals the annual rabbit chase through the central Virginia hills. But the last thing the local beaglers and their hounds expect to flush out is a dead body. Disturbingly, it's the second corpse to turn up, after that of a missing truck driver too disfigured to identify. The deaths seem unrelated--until Harry picks up a trail of clues dating back to the state's post-Revolutionary past. The echoes of the Shot Heard Round the World pale in comparison to the dangerous shootout Harry narrowly escapes unscathed. Next time, it may be the killer who gets lucky. But not if Harry's furry friends Mrs. Murphy, Pewter, and Tucker can help it. Lending their sharp-nosed talents to the hunt, they'll help their mistress keep more lives from being lost--and right an injustice buried since the early days of America's independence. "As feline collaborators go, you couldn't ask for better than Sneaky Pie Brown."--The New York Times Book Review"-- Provided by publisher.




ow

CSA Investor Alert: Investment scams imitating well-known financial brands

Toronto – The Canadian Securities Administrators (CSA) is warning the public about scammers claiming to represent large, well-known financial companies.  Recently, the CSA has noted an increase in the number of scams involving the use of professional looking electronic broch




ow

How did households in Mali cope with covariate shocks between 2018 and 2023? Exploration of a unique dataset

Citation Marivoet, Wim; and Hema, Aboubacar. 2024. How did households in Mali cope with covariate shocks between 2018 and 2023? Source: IFPRI Africa Regional Office (AFR)




ow

Irrigation schemes in Ethiopia’s Awash River Basin: An examination of physical, knowledge, and governance infrastructures

Using a representative sample of irrigation schemes, the study documents the physical, knowledge, and governance infrastructures of irrigation schemes in Ethiopia’s most intensively used river basin, the Awash. The findings show that about 20 percent of the equipped area of irrigation schemes in the basin is not being irrigated, while the number of actual beneficiaries […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program





ow

SpotOn London Is Now Free To Attend! Join us on the 14th & 15th November

We are thrilled to announce that we have decided to make tickets to this year’s




ow

Avatar : the last airbender. Smoke and shadow. Part 1 / script, Gene Luen Yang ; art and cover, Gurihiru ; lettering, Michael Heisler.

When the Fire Nation begins to believe that the country will perish if Zuko stays in power, Avatar Aang and his friends must protect the ruler.




ow

Avatar, the last airbender. Smoke and shadow. Part 3 / script, Gene Luen Yang ; art and cover, Gurihiru ; lettering, Michael Heisler.

"Children are disappearing in the Fire Nation capitol! Avatar Aang and his friends are doing everything in their power to save them--but will it be enough?! What's worse, when Azula--the mad sister of Fire Lord Zuko--appears on the scene, Zuko locks down the capitol to catch her, igniting fear and riots in the streets! Will Zuko follow in his evil father's footsteps in order to save those he holds dear?!"--Amazon.com.




ow

My little pony. 14, Shadowplay / story by Josh Haber ; adaptation by Justin Eisinger ; lettering and design by Nathan Widick.

"When Sunburst discovers the lost journal of Star Swirl the Bearded, he shares it with Twilight Sparkle. Together, they find out how the sorcerer and several other of Equestria's heroes, known as the Pillars of Old Equestria, sacrificed themselves to defeat the evil Pony of Shadows. After researching more about the heroes' disappearance, Twilight believes that the Pillars are still alive and trapped in limbo and becomes obsessed with trying to free them, but it might not be such a good idea!" -- Provided by publisher




ow

Aster and the accidental magic / story and script, Thom Pico ; story and art, Karensac ; translated by Anne and Owen Smith.

"A fun, action-packed fantasy adventure about a girl, her dog, and magic gone wrong! Quiet … birds … nature … . That's what Aster expects when her parents move their whole family to the middle of nowhere. It's just her (status: super-bored), her mom and dad (status: busy with science), her brother (status: has other plans), and … magic? In her new home, Aster meets a mysterious old woman with a herd of dogs who gives her a canine companion of her own. But when she and her dog Buzz are adventuring in the forest, they run into a trickster spirit who gives Aster three wishes. After wishing for the ability to understand and talk to her dog, she becomes only able to talk in dog language … and the trouble she gets into is just starting. Maybe the middle of nowhere will be more interesting than Aster thought."




ow

Aster and the mixed up magic / story and script, Thom Pico ; story and art, Karensac ; [translated by Anne and Owen Smith].

"Magic turned Aster's life upside-down— and it's not over! Get ready for more family, more fun, and even more magic in this graphic novel adventure. Moving to the middle of nowhere has been less of a disaster than Aster expected. Her mom's science experiments are actually pretty cool; her dad's cooking has gotten much better; her new dog is possibly the best canine companion anyone could ask for. And she's gotten to save the day— and her family— and the whole valley she lives in— from various magical calamities in what even she has to admit were extremely fun adventures. So now she can have a break, right? Guess what? Oh no; things get even more interesting." -- Description provided by publisher.




ow

CSA Notice and Request for Comment – Proposed Amendments and Changes to Certain National Instruments and Policies Related to the Senior Tier of the Canadian Securities Exchange, the Cboe Canada Inc. and AQSE Growth Market Name Changes, and Majority Voting

This document is only available in PDF format.




ow

World Food Prize Week in Des Moines, Iowa

I was delighted to spend the last week in Des Moines, Iowa, on the occasion of this year’s World Food Prize Week. To start the week, I had the pleasure of presenting the report, “How the United States Benefits from Agricultural and Food Security in Developing Countries,” together with the Board for International Food and […]




ow

Continuing collaboration with FAO toward the SDGs

I had the pleasure of meeting with FAO Director-General Qu Dongyu in Rome this week. On behalf of IFPRI, I had the chance to renew the Memorandum of Understanding with FAO to further strengthen collaboration and partnership toward our shared goal of achieving the Sustainable Development Goals (SDGs) by 2030. Building on successful IFPRI-FAO partnerships, […]




ow

How can African agriculture adapt to climate change: The impact of climate change and adaptation on food production in low-income countries: Evidence from the Nile Basin, Ethiopia [in Amharic]

Growing consensus in the scientific community indicates that higher temperatures and changing precipitation levels resulting from climate change will depress crop yields in many countries over the coming decades. This is particularly true in low-income countries, where adaptive capacity is low. Many African countries are particularly vulnerable to climate change because their economies largely depend on climate-sensitive agricultural production.




ow

How can African agriculture adapt to climate change: Analysis of the determinants of farmers' choice of adaptation methods and perceptions of climate change in the Nile Basin of Ethiopia [in Amharic]

"Ethiopia's agricultural sector, which is dominated by smallscale, mixed-crop, and livestock farming, is the mainstay of the country's economy. It constitutes more than half of the country's gross domestic product, generates more than 85 percent of foreign exchange earnings, and employs about 80 percent of the population. Unfortunately, Ethiopia's dependence on agriculture makes the country particularly vulnerable to the adverse impactsof climate change on crop and livestock production.




ow

How can African agriculture adapt to climate change: Risk aversion in low-income countries: Experimental evidence from Ethiopia [in Amharic]

Agricultural production remains the main source of livelihood for rural communities in Sub-Saharan Africa, providing employment to more than 60 percent of the population and contributing about 30 percent of gross domestic product. With likely long-term changes in rainfall patterns and shifting temperature zones, climate change is expected to significantly affect agricultural production, which could be detrimental to the region’s food security and economic growth.




ow

How can African agriculture adapt to climate change: Perceptions of stakeholders on climate change and adaptation strategies in Ethiopia [in Amharic]

The potential adverse effects of climate change on Ethiopia’s agricultural sector are a major concern, particularly given the country’s dependence on agricultural production. Securing Ethiopia’s economic and social well-being in the face of climate change requires that policymakers and stakeholders work together to integrate climate change adaptation into the country’s development process.




ow

How can African agriculture adapt to climate change: Impacts of considering climate variability on investment decisions in Ethiopia [in Amharic]

Numerous studies indicate that agricultural production is sensitive to climate variability, and lack of infrastructure in developing countries increases vulnerability to extreme climate events. In Ethiopia, the historical climate record indicates frequent droughts and floods, which can devastate agricultural production and existing infrastructure. Too much precipitation can flood crops, rot or suffocate roots, and wash out roads, creating similar economic conditions to those resulting from drought.




ow

Integrated management of the Blue Nile Basin in Ethiopia under climate variability and climate change hydropower and irrigation modeling [in Amharic]

Ethiopia possesses abundant water resources and hydropower potential, yet less than 5 percent of irrigable land in the Blue Nile basin has been developed for food production, and more than 80 percent of Ethiopians lack access to electricity. Consequently, the Ethiopian government is pursuing plans to develop hydropower and irrigation along the Blue Nile River in an effort to tap into this underused potential.




ow

How can African agriculture adapt to climate change: Measuring Ethiopian farmers’ vulnerability to climate change across regional states [in Amharic]

Ethiopia’s agricultural sector, which is dominated by smallscale, mixed crop, and livestock farming, is the mainstay of the country’s economy. It constitutes more than half the nation’s gross domestic product (GDP), generates more than 85 percent of the foreign exchange earnings, and employs about 80 percent of the population. Ethiopia’s dependence on agriculture makes the country particularly vulnerable to the adverse impacts of climate change on crop and livestock production.




ow

Mr. Lincoln's T-mails : the untold story of how Abraham Lincoln used the telegraph to win the Civil War / Tom Wheeler.

The Civil War was the first "modern war." Because of the rapid changes in American society, Abraham Lincoln became president of a divided United States during a period of technological and social revolution. Among the many modern marvels that gave the North an advantage was the telegraph, which Lincoln used to stay connected to the forces in the field in almost real time. No leader in history had ever possessed such a powerful tool to gain control over a fractious situation. An eager student of technology, Lincoln had to learn to use the power of electronic messages. Without precedent to guide him, Lincoln began by reading the telegraph traffic among his generals. Then he used the telegraph to supplement his preferred form of communication-meetings and letters. He did not replace those face-to-face interactions. Through this experience, Lincoln crafted the best way to guide, reprimand, praise, reward, and encourage his commanders in the field. By paying close attention to Lincoln's "lightning messages," we see a great leader adapt to a new medium. No listener of this work of history will be able to miss the contemporary parallels. Watching Lincoln carefully word his messages-and follow up on those words with the right actions-offers a striking example for those who spend their days tapping out notes on computers and BlackBerrys.




ow

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. Tenable has published reports for each OWASP version that has been released (2010,2013,2017, API 2019, and 2021). The individual reports provide organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for the OWASP version being utilized.

The OWASP Top 10 Application Security Risks document outlines several different aspects of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified in the OWASP Top 10 Application Security Risks document for the relevant OWASP version being currently being used. Compliance related issues, such as known vulnerable components and insufficient logging, must be remediated to eliminate gaps in an organization's security that are not directly tied to exploitable attacks.

This report covers all aspects of the OWASP Top 10 version being utilized and provides administrators the tools and information needed to aid their efforts. The report contains 10 chapters, each aligned with one of the ten most critical web application risks (A1-A10). The information provides guidance to organizations on the actions necessary to mitigate business risk through strong security practices. The report requirements are Tenable Web App Scanning.

Report Templates:

The OWASP Top 10 categories are updated every 3 to 4 years and highlight the most critical web application security vulnerabilities. The following report templates are available and contain sections for each of the listed OWASP Top 10 categories.

  • OWASP Categories 2010 - For 2010, the OWASP Top 10 focuses on Injection, Cross-Site Scripting (XSS), and Broken Authentication in the top three positions.
  • OWASP Categories 2013 - For 2013, the OWASP Top 10 focuses on Injection, Broken Authentication and Session Management in the top three positions.
  • OWASP Categories 2017 - For 2017, the OWASP Top 10 focuses on Injection, Broken Authentication, and Sensitive Data Exposure in the top three positions.
  • OWASP Categories API 2019 - For 2019, the OWASP Top 10 focuses on Broken Object Level Authorization, Broken User Authentication, and Excessive Data Exposure in the top three positions.
  • OWASP Categories 2021 - For 2021, the OWASP Top 10 focuses on Broken Access Control, Cryptographic Failures, and Injection in the top three positions.




ow

Dear Jacob / Sabelo Soweto Mandlanzi.

Dear reader, The fact that Jacob Zuma is the twelfth president of ANC and Jacob had twelve sons makes me sigh because folks may lie but numbers dont. Besides, Jacobs successor was Joseph while Jacob Zumas brother is Joseph, now this offsets my axis. My reasons to conduct an audit on these signs of fate finds more evidencecould Jacobs life be the pieces of the puzzle of Jacob Zumas that weve been looking for? What you see right now is the answer. Dear Jacob is a radical connection between these two Jacobs: the grandson of Abraham and the honorable president of the Republic of South Africa, Mr. Jacob G. Zuma. This is billion miles ahead of inspiration, a healthy root of the political expertise and leadership evolution. But here I focus on presenting Jacob as Jacob Zuma, human yet divine, dejected, rejected, and despised, but chosen. In this letter, the worst and the best moments of Jacob are prognostic to the life of Jacob Zuma, but negativity is to me a myth because positivity is my path. The story that brings nemesis to the enemies of positive reception is found from Genesis 25:19 and beyond in the King James Bible. I have cared for the meanings on the wall because words can start a war. Not only will you see Jacob Zuma different after reading this book, but you should be able to predict the next events that might occur as the clock of life moves toward the beginning.




ow

Downing of a Flag

A documentary film that focuses on the Confederate battle flag and its impact on the people, politics, and perceptions of South Carolina and beyond. Through firsthand interviews featuring various perspectives and a wealth of historical footage, Downing of a Flag traces the symbol's controversial relationship with the Palmetto State, exploring its true meaning and how an unspeakable tragedy catalyzed its long-debated removal. The story begins with the end of the Civil War and chronicles the flag's more than 150-year journey from the blood-soaked battlefields of Virginia to its use in American popular culture in the 1970s and 1980s, to its final removal from the South Carolina State House grounds in July 2015. Preceded by the killing of nine black parishioners at Charleston's historic Mother Emanuel AME Church by a white supremacist, the Confederate Battle flag's furling and the days and actions that led to that event could represent the final shots and battles of the American Civil War.




ow

Musée d’Orsay showcases the work of pioneering Norwegian painter Harriet Backer.

Musée d’Orsay showcases the work of pioneering Norwegian painter Harriet Backer. From 24 September 2024...




ow

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP)  to help educate developers and security professionals on the latest web application security risks. This dashboard provides organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for 2021.

The OWASP Application Security Risks document outlines several different categories of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. OWASP's focus is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified by OWASP. Remediating compliance related issues, such as known vulnerable components and insufficient logging, is important to eliminate gaps in an organization's infrastructure that are not directly tied to exploitable attacks.

These dashboards are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboards can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are:

  • Tenable.sc 6.2.0
  • Tenable Web Application Scanning

This dashboard covers all versions of the OWASP Top 10 from 2010 to 2021, and provides administrators the tools and information needed to aid their efforts. The dashboard provides comparative view between version, using the cross-reference field utilized by plugins. The information will guide organizations on the actions to mitigate business risk through strong security practices. 

Components

WAS Data Concerns: This bar chart displays current (2021) OWASP vulnerability counts, sorted by plugin family and severity. According to OWASP, "the Top 10 represents a broad consensus about the most critical security risks to web applications." Identifying and fixing these issues provides organizations with a solid foundation for secure web development.

OWASP Categories by URL: This component displays vulnerability status counts for each Uniform Resource Locator (URL) within the organization. The URLs are sorted from those with the highest, most severe vulnerabilities to the least severe. Each URL has a graph of severity results for each severity category. 

OWASP Versions by State: This matrix displays the current and all previous OWASP versions along with a column displaying each state (New, Current, Resurfaced, Fixed). This information assists organizations in identifying OWASP vulnerabilities that are new, currently active, have previously been mitigated and have resurfaced, or have been fixed, for each OWASP version. 

OWASP Versions by Severity: This matrix displays the current and all previous OWASP Top 10 from Critical to Low. Each cell displays data on the count of web application vulnerabilities associated with the OWASP Top 10 release, and severity level. This information assists organizations in identifying the most severe OWASP vulnerabilities for the OWASP version in use.