of You look like death : tales from the Umbrella Academy / story, Gerard Way and Shaun Simon ; art & colors, I.N.J. Culbard ; letters, Nate Piekos of Blambot ; cover and chapter breaks by Gabriel Bá. By library.gcpl.lib.oh.us Published On :: "When 18-year-old Klaus gets himself kicked out of the Umbrella Academy and his allowance discontinued, he heads to a place where his ghoulish talents will be appreciated— Hollywood. But after a magical high on a stash stolen from a vampire drug lord, Klaus needs help, and doesn't have his siblings there to save him." -- Provided by publisher. Full Article
of The rose of Versailles. Volume 4 / Ryoko Ikeda ; translation: Jocelyne Allen ; lettering and touch up: Jeannie Lee. By library.gcpl.lib.oh.us Published On :: "France spirals towards a civil war, as nobles continue to ignore the people of France. Noblewoman Oscar Fraṅois de Jarjayes is forced to reconsider her life as a soldier and a woman, her loyalties and her love. Marie Antoinette and the royal family seek escape, while Robespierre and the National Assembly take up arms and demand democracy." -- Provided by publisher. Full Article
of Innovations of targeted poverty reduction governance and policy in Zhejiang Province: Insights from China’s post-2020 anti-poverty strategy [in Chinese] By www.ifpri.org Published On :: Tue, 03 Nov 2020 5:05:01 EST Full Article
of The impacts of COVID-19 on global food security and the coping strategy [in Chinese] By www.ifpri.org Published On :: Fri, 11 Dec 2020 5:05:01 EST Article PDF (download) Full Article
of Study on countermeasures of Agriculture against Economic and Trade Frictions between China and USA [in Chinese] By www.ifpri.org Published On :: Sat, 12 Dec 2020 5:05:01 EST Full Article
of Nutrition and economic development: Exploring Egypt's exceptionalism and the role of food subsidies [in Chinese] By www.ifpri.org Published On :: Wed, 31 Mar 2021 5:05:01 EDT Full Article
of Monitoring indicators of economic activity in Sudan amidst ongoing conflict using satellite data [in Arabic] By www.ifpri.org Published On :: Sat, 10 Jun 2023 5:05:01 EDT استمرت المواجهة في السودان بين القوات المسلحة السودانية وقوات الدعم السريع لعدة أشهر قبل أن تتصاعد إلى نزاع مسلح في 15 أبريل 2023. بالإضافة ة إلى جانب الكارثة الإنسانية، عطل النزاع العديد من الخدمات العامة مثل الكهرباء والمياه والخدمات الصحية والخدمات المصرفية، بينما تعطل أيضا الوصول إلى الأسواق، مما أدى إلى ندرة كبيرة في السلع والخدمات. وقد دمر الصراع البنية التحتية الرئيسية، وقيد التجارة المحلية والدولية وعطل أنشطة الإنتاج وسلاسل الموردين. Full Article
of The architecture of the Sudanese agricultural sector and its contribution to the economy between 1990 and 2021 [in Arabic] By www.ifpri.org Published On :: Sat, 26 Aug 2023 5:05:01 EDT بنية القطاع الزراعي السوداني ومساهمته في الاقتصاد بين عامي 1990 و2021 Full Article
of The economy-wide impact of Sudan’s ongoing conflict: Implications on economic activity, agrifood system and poverty [in Arabic] By www.ifpri.org Published On :: Wed, 04 Oct 2023 5:05:01 EDT دخل النزاع المسلح بين القوات المسلحة السودانية وقوات الدعم السريع في السودان شهره السادس منذ اندلاعه في 15 أبريل 2023، دون أي مؤشرات على انتهائه قريبا. تسببت الحرب في كارثة إنسانية حادة، دمرت البنية التحتية الرئيسية، وقيدت أنشطة التجارة والإنتاج. علاوة على ذلك، أدى ذلك إلى تعطيل الوصول إلى المرافق العامة والخدمات المالية والأسواق، مما أدى إلى ندرة كبيرة في السلع والخدمات. في هذه الورقة، نستخدم إطار نمذجة مضاعف مصفوفة المحاسبة الاجتماعية لتقييم الآثار الاقتصادية على مستوى الاقتصاد لهذه الاضطرابات في النشاط الاقتصادي والموارد الإنتاجية وسبل العيش. Full Article
of Political and economic drivers of Sudan's armed conflict: Implications for the agri-food system [in Arabic] By www.ifpri.org Published On :: Fri, 12 Jan 2024 5:05:01 EST Full Article
of Standoff Sandra Brown. By library.gcpl.lib.oh.us Published On :: An ambitious female television reporter is driving through New Mexico when she hears that a Texas millionarie's teenage daughter has been kidnapped. Knowing the girl's father lives nearby, she quickly lines up an interview. The situation quickly spins out of control, however, and the reporter finds herself at the center of a tense situation that could have devastating consequences for all involved. Full Article
of The Gods of Guilt Michael Connelly. By library.gcpl.lib.oh.us Published On :: Mickey Haller gets the text, "Call me ASAP - 187," and the California penal code for murder immediately gets his attention. Murder cases have the highest stakes and the biggest paydays, and they always mean Haller has to be at the top of his game. When Mickey learns that the victim was his own former client, a prostitute he thought he had rescued and put on the straight and narrow path, he knows he is on the hook for this one. He soon finds out that she was back in LA and back in the life. Far from saving her, Mickey may have been the one who put her in danger. Full Article
of After Dead What Came Next in the World of Sookie Stackhouse Charlaine Harris. By library.gcpl.lib.oh.us Published On :: Find out what happened after the conclusion of the #1 New York Times bestselling Sookie Stackhouse series. Dead Ever After marked the end of the Sookie Stackhouse series-novels that garnered millions of fans and spawned the hit HBO television show True Blood. It also stoked a hunger that will never die...a hunger to know what happened next. With characters arranged alphabetically-from the Ancient Pythoness to Bethany Zanelli-bestselling author Charlaine Harris takes fans into the future of their favorite residents of Bon Temps and environs. You'll learn how Michele and Jason's marriage fared, what happened to Sookie's cousin Hunter, and whether Tara and JB's twins grew up to be solid citizens. This coda provides the answers to your lingering questions-including details of Sookie's own happily-ever-after... Full Article
of Aggressive Stock Promotion Exploits Fears of Coronavirus Recession By www.osc.ca Published On :: Tue, 14 Apr 2020 12:00:00 GMT TORONTO – The Ontario Securities Commission (OSC) is warning the public about aggressive promotion of Crestview Exploration Inc. Full Article
of Investor Alert: Fraudulent social media “investment groups” take advantage of unsuspecting investors By www.osc.ca Published On :: Tue, 09 Jul 2024 13:23:57 GMT TORONTO – The Canadian Securities Administrators (CSA) warns Canadians about fraudulent “investment groups” promoted on social media like Facebook and Instagram. These groups could be running a scam called a “pump and dump.”How the scam works: Full Article
of How did households in Mali cope with covariate shocks between 2018 and 2023? Exploration of a unique dataset By africa.ifpri.info Published On :: Mon, 04 Nov 2024 16:36:30 +0000 Citation Marivoet, Wim; and Hema, Aboubacar. 2024. How did households in Mali cope with covariate shocks between 2018 and 2023? Source: IFPRI Africa Regional Office (AFR) Full Article Africa conflicts; extreme weather events; farming systems; households New Publication News Publications shock; food prices food security livestock violence
of Irrigation schemes in Ethiopia’s Awash River Basin: An examination of physical, knowledge, and governance infrastructures By essp.ifpri.info Published On :: Wed, 06 Nov 2024 09:06:37 +0000 Using a representative sample of irrigation schemes, the study documents the physical, knowledge, and governance infrastructures of irrigation schemes in Ethiopia’s most intensively used river basin, the Awash. The findings show that about 20 percent of the equipped area of irrigation schemes in the basin is not being irrigated, while the number of actual beneficiaries […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article News Publications
of Unleashing the potential of Generation Z for food system transformation in Africa By massp.ifpri.info Published On :: Thu, 07 Nov 2024 06:23:47 +0000 Africa’s population is the youngest of any region, with more than 400 million young people aged 15 to 35 out of a total of 1.5 billion. But even though rising numbers of this cohort—a “youth bulge”—enter the labor market every year, African economies a... Source: IFPRI Malawi: Malawi Strategy Support Program Full Article Blogs Featured Post Food systems News Strengthening Governance
of IFPRI @ 29th UN Climate Change Conference of the Parties (COP29) By massp.ifpri.info Published On :: Wed, 13 Nov 2024 09:24:21 +0000 IFPRI is pleased to participate in the 29th UN Climate Change Conference of the Parties (COP29) being held in Baku, Azerbaijan from November 11 to November 22, 2024. COP29 is a pivotal opportunity to accelerate action to tackle the climate crisis. With... Source: IFPRI Malawi: Malawi Strategy Support Program Full Article Climate Change Events Featured Post Food systems News Resilience
of Demon slayer = kimetsu no yaiba. Volume 20, The path of opening a steadfast heart / story and art by Koyoharu Gotouge ; translation, John Werry ; English adaptation, Stan! ; touch-up art & lettering, John Hunt. By library.gcpl.lib.oh.us Published On :: "In Taisho-era Japan, kindhearted Tanjiro Kamado makes a living selling charcoal. But his peaceful life is shattered when a demon slaughters his entire family. His little sister Nezuko is the only survivor, but she has been transformed into a demon herself! Tanjiro sets out on a dangerous journey to find a way to return his sister to normal and destroy the demon who ruined his life … After their initial confrontation with Kokushibo, the most powerful of Muzan's demons, Tokito is severely wounded and Genya has been cut in half— but is still alive! Can his regenerative power heal even this fatal wound? Then the Hashira Himejima and Sanemi square off against Kokushibo and unleash all the skill they have against him. Himejima is blind, but if he can see into the Transparent World, he might have a chance. Who will survive this whirlwind of flashing blades?"-- Provided by publisher. Full Article
of Demon slayer = Kimetsu no yaiba. Volume 22, The wheel of fate / story and art by Koyoharu Gotouge ; translation, John Werry ; English adaptation, Stan! ; touch-up art & lettering, John Hunt. By library.gcpl.lib.oh.us Published On :: "After centuries of preparation and training, the Demon Slayer Corps has come face-to-face with their nemesis, Muzan Kibutsuji. It is a desperate battle and several Demon Slayers have already been killed. Tanjiro himself has engaged Muzan, and, despite giving it everything he has, is taken out of the fight! Although severely injured and near death, he sees a vision of his ancestor that may hold the key to finally destroying Muzan! Can Tanjiro recover enough strength to fight Muzan to the finish?" -- Provided by publisher Full Article
of The Count of Monte Cristo / Alexandre Dumas ; art by: Nokman Poon ; story adaptation by: Crystal S. Chan ; lettering by Morpheus Studios ; lettering assist: Jeannie Lee. By library.gcpl.lib.oh.us Published On :: On the very day of his wedding to the beautiful Mercedes, a young merchant sailor named Edmond Dantès is falsely imprisoned for life, laying to waste his plans of marriage and hard-earned fortune. Following several long years in prison he has managed to escape and reinvent himself as the mysterious Count of Monte Cristo. It is the reign of Napoleon Bonaparte and the Count has been plotting his revenge on the three men who had him falsely imprisoned. With a new identity, an incredible education abroad and a vast fortune, he has returned completely unrecognizable to those who had committed their crimes against him. Full Article
of The stories of Edgar Allan Poe / story adaptation by: Stacy King. By library.gcpl.lib.oh.us Published On :: The Stories of Edgar Allan Poe is a brilliant collection of some of his best-known stories: The Tell Tale Heart (a murder's haunting guilt), The Cask of Amontillado (a story of brilliant revenge), and The Fall of the House of Usher (an ancient house full of very dark secretes). Also included in this collection are The Mask of the Red Death (horrors of 'the Plague'), and the most famous of all his poems: The Raven (a lover's decline into madness). Best read in a dimly-lit room with the curtains drawn, Poe's brilliant works come to life in darkly thrilling ways in this Manga Classic adaptation. Full Article
of Catwoman. Soulstealer : the graphic novel / based on the novel written by Sarah J. Maas ; adapted by Louise Simonson ; illustrated by Samantha Dodge with Carl Potts and Brett Ryans ; colors by Shari Chankhamma ; letters by Saida Temofonte. By library.gcpl.lib.oh.us Published On :: Selina Kyle returns to Gotham City as new socialite Holly Vanderhees, but she needs to outsmart rival Batwing to rise to the top of the city's criminal underbelly. Full Article
of Batman. Earth one. Volume 3 / written by Geoff Johns ; pencils by Gary Frank ; inks by Jon Sibal ; colors by Brad Anderson ; lettered by Rob Leigh ; cover by Gary Frank and Brad Anderson. By library.gcpl.lib.oh.us Published On :: "Harvey Dent is dead. Or is he? A gang of thieves thrusts Gotham City into a state of fear when they are mysteriously well armed with military-grade weapons: flamethrowers, grenade launchers, and even tanks. And this gang claims it is funded by none other than former district attorney Harvey Dent. Bruce Wayne, balancing his two lives, must find the truth by tapping his growing network of agents, including Alfred Pennyworth, Jim Gordon, Waylon 'Killer Croc' Jones, and the savvy new Catwoman. Bruce is distracted by the seemingly impossible return of another figure believed dead: his grandfather Adrian Arkham. He must also comfort his longtime friend, Gotham City Mayor Jessica Dent, who is scarred both physically and mentally from her experience with the Riddler, which resulted in the gruesome death of her brother. But is Harvey back, plotting revenge on a city he proclaims to be guilty? When Batman discovers the truth behind these many mysteries, his entire world unravels … ." -- Page [4] of cover. Full Article
of Yona of the dawn. 6 / story & art by Mizuho Kusanagi ; English adaptation, Ysabet Reinhardt MacFarlane ; translation JN Productions. By library.gcpl.lib.oh.us Published On :: "Yona finally meets Jaeha, the Green Dragon. Unfortunately, Jaeha has no desire to follow her on her quest! Yona offers to help Jaeha and his fellow pirates, so Captain Gi-gan challenges her with a perilous quest to test her courage." -- Cover. Full Article
of Yona of the dawn. 7 / story and art by Mizuho Kusanagi ; English adaptation, Ysabet Reinhardt MacFarlane ; translation, JN Productions ; touch-up art & lettering, Lys Blakeslee. By library.gcpl.lib.oh.us Published On :: "In order to free the port town of Awa from an evil tyrant, Yona and her friends team up with Jaeha, the Green Dragon, and his fellow pirates. While Hak and the others are fighting Yang Kum-ji's forces, Yona and Yun infiltrate a human trafficking operation! When the enemy closes in and things look dire, what will Yona do?" -- Page [4] cover. Full Article
of Apple of my pie / Mika Song. By library.gcpl.lib.oh.us Published On :: "When local park fixture (and spy-master) Pops gets squirrel-napped, it's up to Norma, Belly, and their friend little B to save him!" -- Provided by publisher. Full Article
of Blades of freedom / Blades of Freedom: A Tale of Haiti, Napoleon, and the Louisiana Purchase Nathan Hale. By library.gcpl.lib.oh.us Published On :: Presents, in graphic novel format, the story of the Haitian Revolution and its role in Napoleon's decision to sell Thomas Jefferson and James Monroe the whole Louisiana Territory, when they sought to buy only New Orleans. Full Article
of The way of the hive : a honey bee's story / Jay Hosler. By library.gcpl.lib.oh.us Published On :: "Nyuki is a brand-new honey bee, and she has a lot of questions. Follow her on a lifelong journey as she annoys her sisters, avoids predators, and learns to trust her inner voice as she masters the way of the hive. Includes a section at the end of the book called 'Odds & Ends' with facts and information about bees."--Provided by publisher. Full Article
of Moana : the story of the movie in comics / manuscript adaptation, Alesandro Ferrari ; layouts, Alberto Zanon, Giada Perissinotto ; pencil/inking, Veronica Di Lorenzo, Luca Bertelè ; colors, Massimo Rocca [and four others]. By library.gcpl.lib.oh.us Published On :: "Sail the Pacific Islands in search of destiny and the demigod Maui in this retelling of Disney Moana. Moana is a spirited teenager who loves the ocean, yet she is forbidden to travel beyond the reef that surrounds her island home of Motunui. But she feels called to something more, and wants to discover who she was meant to be. When darkness begins to consume the island, and nature is out of balance, Moana knows the solution lies beyond the safety of the reef. Following the messages of her ancestors, and with encouragement from the ocean itself, Moana sails into the open sea to find the demigod Maui and right a wrong from his past. Together they face rough waters, monstrous creatures, and the unknown, in a mission to stop the darkness from spreading, and restore life to the islands! Become a master wayfinder in this action-packed story as Moana's love for the sea turns her into a hero among her people, the gods, and the ocean." -- Provided by publisher Full Article
of Abraham Lincoln : Defender of the Union! / by Mark Shulman ; illustrated by Tom Martin ;lettering & design by Comicraft ; cover art by Ian Churchill. By library.gcpl.lib.oh.us Published On :: "Considered by many historians to be the greatest American president, Abraham Lincoln led the Union at the greatest turning point in the nation's history. Abraham Lincoln: Defender of the Union! tells the story of one of America's most admired figures in graphic novel format. From his childhood on a farm in Kentucky to the battlefields of the Civil War, Abraham Lincoln served the United States with resolve, intelligence, and courage unlike that of any other president. Readers of all ages will be entertained and educated by the full-color illustrations and historically accurate narrative of this graphical biography." -- Provided by publisher. Full Article
of Amelia Earhart : pioneer of the sky! / by James Buckley Jr ; illustrated by Kelly Tindall, lettering & design by Comicraft ; cover art by Ian Churchill. By library.gcpl.lib.oh.us Published On :: "When Amelia Earhart became the first woman to make a solo flight across the Atlantic Ocean in 1932, she immediately became an American icon and a subject of endless fascination for generations to come. In Amelia Earhart: Pioneer of the Sky!, the story of the bold and daring aviator's life is presented in graphic novel format, with full-color illustrations and historically accurate details. From her hardscrabble childhood to her final flight— and mysterious disappearance— Earhart's journey will entertain, captivate, and inspire readers of all ages." -- Provided by publisher Full Article
of Benjamin Franklin : inventor of the nation! / by Mark Shulman ; illustrated by Kelly Tindall ; lettering & design by Comicraft ; cover art by Ian Churchill. By library.gcpl.lib.oh.us Published On :: "Benjamin Franklin has been called one of the most accomplished and influential Americans in history, and his role in shaping the United States has had a lasting impact that is still felt today. Franklin's research into topics as varied as electricity, meteorology, demography, and oceanography were as wide-ranging and important as his travels, which took him across the globe as a diplomat." -- Provided by publisher. Full Article
of CSA Notice and Request for Comment – Proposed Amendments and Changes to Certain National Instruments and Policies Related to the Senior Tier of the Canadian Securities Exchange, the Cboe Canada Inc. and AQSE Growth Market Name Changes, and Majority Voting By www.osc.ca Published On :: Wed, 31 Jul 2024 17:37:50 GMT This document is only available in PDF format. Full Article
of CSA Notice of Consultation – Proposed Amendments to National Instrument 94-101 Mandatory Central Counterparty Clearing of Derivatives By www.osc.ca Published On :: Thu, 19 Sep 2024 14:12:34 GMT IntroductionThe members of the Canadian Securities Administrators (the CSA or we) are publishing for comment proposed amendments to National Instrument 94-101 Mandatory Central Counterparty Clearing of Derivatives (National Instrument 94 Full Article
of Engaging with health and nutrition communities to ensure the role of agriculture and food in China By dgcorner.ifpri.info Published On :: Mon, 30 Sep 2019 14:20:32 +0000 Recently I had the pleasure of engaging several events focusing on the intersection of food, nutrition, and health in China. First, I participated in the 3rd Belt & Road Initiative Global Health International Congress, held in Xi’an, which brought together stakeholders with a vision to strengthen exchanges and cooperation in health research for the Belt […] Full Article DG Corner Homepage Feature Events Posts China diet food security food system health nutrition
of How can African agriculture adapt to climate change: The impact of climate change and adaptation on food production in low-income countries: Evidence from the Nile Basin, Ethiopia [in Amharic] By www.ifpri.org Published On :: Sat, 07 Feb 2015 2:14:37 EST Growing consensus in the scientific community indicates that higher temperatures and changing precipitation levels resulting from climate change will depress crop yields in many countries over the coming decades. This is particularly true in low-income countries, where adaptive capacity is low. Many African countries are particularly vulnerable to climate change because their economies largely depend on climate-sensitive agricultural production. Full Article
of How can African agriculture adapt to climate change: Analysis of the determinants of farmers' choice of adaptation methods and perceptions of climate change in the Nile Basin of Ethiopia [in Amharic] By www.ifpri.org Published On :: Sat, 07 Feb 2015 2:14:37 EST "Ethiopia's agricultural sector, which is dominated by smallscale, mixed-crop, and livestock farming, is the mainstay of the country's economy. It constitutes more than half of the country's gross domestic product, generates more than 85 percent of foreign exchange earnings, and employs about 80 percent of the population. Unfortunately, Ethiopia's dependence on agriculture makes the country particularly vulnerable to the adverse impactsof climate change on crop and livestock production. Full Article
of How can African agriculture adapt to climate change: Perceptions of stakeholders on climate change and adaptation strategies in Ethiopia [in Amharic] By www.ifpri.org Published On :: Sat, 07 Feb 2015 2:14:37 EST The potential adverse effects of climate change on Ethiopia’s agricultural sector are a major concern, particularly given the country’s dependence on agricultural production. Securing Ethiopia’s economic and social well-being in the face of climate change requires that policymakers and stakeholders work together to integrate climate change adaptation into the country’s development process. Full Article
of How can African agriculture adapt to climate change: Impacts of considering climate variability on investment decisions in Ethiopia [in Amharic] By www.ifpri.org Published On :: Sat, 07 Feb 2015 2:14:37 EST Numerous studies indicate that agricultural production is sensitive to climate variability, and lack of infrastructure in developing countries increases vulnerability to extreme climate events. In Ethiopia, the historical climate record indicates frequent droughts and floods, which can devastate agricultural production and existing infrastructure. Too much precipitation can flood crops, rot or suffocate roots, and wash out roads, creating similar economic conditions to those resulting from drought. Full Article
of Integrated management of the Blue Nile Basin in Ethiopia under climate variability and climate change hydropower and irrigation modeling [in Amharic] By www.ifpri.org Published On :: Sat, 07 Feb 2015 2:14:37 EST Ethiopia possesses abundant water resources and hydropower potential, yet less than 5 percent of irrigable land in the Blue Nile basin has been developed for food production, and more than 80 percent of Ethiopians lack access to electricity. Consequently, the Ethiopian government is pursuing plans to develop hydropower and irrigation along the Blue Nile River in an effort to tap into this underused potential. Full Article
of Monitoring the impact of COVID-19 in Myanmar: Mechanization service providers - June 2020 survey round By www.ifpri.org Published On :: Tue, 14 Jul 2020 5:05:01 EDT Mechanization service providers in Myanmar were originally interviewed by telephone in early May 2020 in order to determine how their businesses were being affected by COVID-19 related restrictions. The results of that survey were published in Myanmar Strategy Support Program Policy Note 07. To trace the continuing impact of the COVID-19 pandemic on their economic activities, a second phone survey of mechanization service providers was done in mid-June 2020. This Policy Note reports on the results of this second survey. Full Article
of Tenable Research Uncovers Thousands of Vulnerable Cyber Assets Amongst Southeast Asia’s Financial Sector By www.tenable.com Published On :: Thu, 29 Aug 2024 09:09:05 -0400 New research conducted by Tenable®, Inc., the exposure management company, has uncovered more than 26,500 potential internet-facing assets among Southeast Asia’s top banking, financial services and insurance (BFSI) companies by market capitalisation across Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam.On July 15, 2024, Tenable examined the external attack surface of over 90 BFSI organisations with the largest market capitalisations across the region. The findings revealed that the average organisation possesses nearly 300 internet-facing assets susceptible to potential exploitation, resulting in a total of more than 26,500 assets across the study group.Singapore ranked the highest among the six countries assessed, with over 11,000 internet-facing assets identified across its top 16 BFSI companies. Over 6,000 of those assets are hosted in the United States. Next on the list is Thailand with over 5000 assets. The distribution of internet-accessible assets underscores the need for cybersecurity strategies that adapt to the rapidly evolving digital landscape.CountryNumber of internet-facing assets amongst top 90 BFSI companies by market capitalisationSingapore11,000Thailand5,000Indonesia4,600Malaysia4,200Vietnam3,600Philippines2,600“The results of our study reveal that many financial institutions are struggling to close the priority security gaps that put them at risk. Effective exposure management is key to closing these gaps,” said Nigel Ng, Senior Vice President, Tenable APJ. “By identifying and securing vulnerable assets before they can be exploited, organisations can better protect themselves against the growing tide of cyberattacks.” Cyber Hygiene Gaps The Tenable study revealed many potential vulnerabilities and exposed several cyber hygiene issues among the study group, including outdated software, weak encryption, and misconfigurations. These vulnerabilities provide cybercriminals with easily exploitable potential entry points, posing potential risk to the integrity and security of financial data. Weak SSL/TLS encryption A notable finding is that among the total assets, organisations had nearly 2,500 still supporting TLS 1.0—a 25-year old security protocol introduced in 1999 and disabled by Microsoft in September 2022. This highlights the significant challenge organisations with extensive internet footprints face in identifying and updating outdated technologies.Misconfiguration increases external exposureAnother concerning discovery was that over 4,000 assets, originally intended for internal use, were inadvertently exposed and are now accessible externally. Failing to secure these internal assets poses a significant risk to organisations, as it creates an opportunity for malicious actors to target sensitive information and critical systems.Lack of encryption There were over 900 assets with unencrypted final URLs, which can present a security weakness. When URLs are unencrypted, the data transmitted between the user's browser and the server is not protected by encryption, making it vulnerable to interception, eavesdropping, and manipulation by malicious actors. This lack of encryption can lead to the exposure of sensitive information, such as login credentials, personal data, or payment details, and can compromise the integrity of the communication.API vulnerabilities amplify riskThe identification of over 2,000 API v3 out of the total number of assets among organisations' digital infrastructure poses a substantial risk to their security and operational integrity.APIs serve as crucial connectors between software applications, facilitating seamless data exchange. However, inadequate authentication, insufficient input validation, weak access controls, and vulnerabilities in dependencies within API v3 implementations create a vulnerable attack surface.Malicious actors can exploit such weaknesses to gain unauthorised access, compromise data integrity, and launch devastating cyber attacks.“The cybersecurity landscape is evolving faster than ever, and financial institutions must evolve with it, so they can know where they are exposed and take action to close critical risk” Ng added. “By prioritising exposure management, these organisations can better protect their digital assets, safeguard customer trust, and ensure the resilience of their operations in an increasingly hostile digital environment.”About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. Notes to Editors:Tenable examined the top 12-16 BFSI companies discoverable based on market cap. In the context of this alert:An asset is a domain name, subdomain, or IP addresses and/or combination thereof of a device connected to the Internet or internal network. An asset may include, but not limited to web servers, name servers, IoT devices, network printers, etc. Example: foo.tld, bar.foo.tld, x.x.x.xs.The Attack Surface is from the network perspective of an adversary, the complete asset inventory of an organisation including all actively listening services (open ports) on each asset. Full Article
of Tenable Launches Tenable Enclave Security to Meet Demands of Highly Secure Environments By www.tenable.com Published On :: Wed, 18 Sep 2024 06:00:00 -0400 Tenable®, the exposure management company, today announced the availability of Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security protects IT assets and modern workloads with risk assessment and contextual insight so organizations can identify exposures before they cause damage.Federal agencies face unique security and compliance regulations when deploying cloud solutions, and Tenable Enclave Security is key to supporting public sector customers, as well as commercial organizations with strict data residency, security or privacy requirements. Built to support the strictest security requirements, including FedRAMP High and Impact Level 5, Tenable Enclave Security empowers agencies to know, expose and close IT and container exposures from a single, highly secure platform. This consolidated approach also eliminates tool sprawl, reduces costs and boosts efficiency for public sector organizations.“As a leader in vulnerability management and cloud security and a longtime partner of governments all around the world, we’re perfectly positioned to tap into our expertise and deliver mission critical capabilities to assist government agencies as they transform their IT strategy and safely embrace modern workloads to speed innovation,” said Robert Huber, chief security officer and president, Tenable Public Sector, Tenable. “With Tenable Enclave Security, agencies are now able to gain a fuller understanding of their exposure and risk with the ability to continuously discover, assess and prioritize vulnerabilities across IT assets and container images, all from a single, highly secure framework.”Tenable Enclave Security will immediately enable organizations to: Meet cloud security and data residency restrictions: Tenable Enclave Security enables customers to meet stringent cloud security and data residency requirements, such as FedRAMP High or Impact Level 5. It can meet customers’ needs wherever they reside, with the ability to be deployed on-prem, in a virtual private cloud or commercial cloud.Secure containers before they hit production: As agencies modernize their infrastructure, containers create a more efficient manner to create applications and modernize existing ones. Tenable Enclave Security empowers organizations to quickly assess the risk in their container images, expose their vulnerabilities and understand the breadth of impact.Centralize security tools: Unlike siloed solutions with fragmented visibility, Tenable Enclave Security provides protection for IT assets and modern workloads from a single deployment architecture. For more information on Tenable Enclave Security, please visit: https://www.tenable.com/products/enclave-security About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
of Tenable Selected by Bank of Yokohama to Secure its Active Directory and Eliminate Attack Paths By www.tenable.com Published On :: Fri, 20 Sep 2024 09:00:47 -0400 Tenable®, Inc. the exposure management company, today announced that Bank of Yokohama, one of the largest of the major regional banks in Japan, has chosen Tenable Identity Exposure to protect its Active Directory and enhance the bank’s ability to protect its internal systems from cyber threats.Bank of Yokohama, based in Kanagawa Prefecture and Tokyo Metropolitan, is committed to enhancing industry security standards. In 2023, it collaborated with 19 other regional banks to establish CMS-CSIRT, an organization providing mutual cybersecurity support. Unlike megabanks, regional banks often face resource and budget constraints, making such collaborative efforts crucial for implementing effective security programs.As part of its objectives for FY 2023, the Bank of Yokohama wanted to improve Active Directory (AD) security as it’s the most crucial system in the bank’s intranet. Previously, the bank only applied security patches periodically without any tool or system to detect Active Directory misconfigurations or attacks. Given the evolving threat landscape and rise of attacks involving an identity breach, enhancing the security of Active Directory became a top priority.“Attackers who have infiltrated an organization's internal system or who wield ransomware and other malware, almost always make a beeline for Active Directory,” said Mr. Akihiro Fushimi, Leader, Concordia Financial Group ICT Governance Department, Security Governance Section and Bank of Yokohama ICT Planning & Promotion Department, Security Governance Section. “They steal user account privileges and elevate them via Active Directory, to enable them to access important data. So, securing Active Directory was an area that we wanted to invest in.”Bank of Yokohama already used Tenable Security Center for vulnerability management and trusted Tenable's reliability. Selecting Tenable Identity Exposure was an easy decision, with its fast, agentless feature ensuring a seamless deployment process.The deployment of Tenable Identity Exposure provided the Bank of Yokohama with an in-depth view of its Active Directory. The bank can now accurately identify every AD account, including dormant accounts and machine identities, and understand the potential risks of exploitation by malicious actors due to the multi-functional capabilities of Active Directory. Tenable Identity Exposure detects many of the techniques used in cyber attacks to gain elevated privileges and enable lateral movement, including DCShadow, Brute Force, Password Spraying, Golden Ticket and more.“Previously, we were under the impression that all we needed to do was to apply patches and manage accounts. Now, with the deployment of Tenable Identity Exposure, we are physically able to see the risk of exploitation. This, I believe, is the positive impact of deploying Tenable Identity Exposure. Its alert functions are comprehensive—it detects vulnerabilities as well as misconfigurations,” said Mr. Shinnosuke Shimada, Bank of Yokohama ICT Planning & Promotion Department, Security, Governance Section.“Many organizations struggle to maintain proper Active Directory security as their domains grow more complex, often leaving flaws undetected until a major incident occurs. Given the high-profile attacks involving AD in recent years, it's crucial to prioritize AD security within the overall cybersecurity strategy,” said Naoya Kishima, Country Manager, Tenable Japan. “Bank of Yokohama recognizes this need, and we're pleased to support them in their security journey.”About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. Media contactTenable PRtenablepr@tenable.com Full Article
of Tenable Tackles Emerging Cloud and AI Risks With the Launch of Data and AI Security Posture Management for Cloud Environments By www.tenable.com Published On :: Tue, 15 Oct 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. By extending exposure management capabilities to cloud data and AI resources, Tenable Cloud Security reduces risk to two of the biggest emerging threats.Today’s cloud environments are more complex than ever. The challenge of managing this complexity has led to preventable security gaps caused by misconfigurations, risky entitlements and vulnerabilities, leaving sensitive data and AI resources vulnerable. In fact, Tenable Research found that 38% of organizations are battling a toxic cloud trilogy – cloud workloads that are publicly exposed, critically vulnerable and highly privileged. Tenable Cloud Security exposes risk from across hybrid and multi-cloud environments, including vulnerabilities, misconfigurations and excess privilege, that affects data and AI resources. Integrating DSPM and AI-SPM into Tenable Cloud Security enables users to automatically discover, classify and analyze sensitive data risk with flexible, agentless scanning. With Tenable Cloud Security’s intuitive user interface, security leaders can easily answer tough questions – such as “What type of data do I have in the cloud and where is it located?,” “What AI resources are vulnerable and how do I remediate the issue?” and “Who has access to my sensitive cloud and AI data?”“Data is constantly on the move and new uses for data in today’s AI-driven world have created new risks,” said Liat Hayun, vice president of product management for Tenable Cloud Security. “DSPM and AI-SPM capabilities from Tenable Cloud Security bring context into complex risk relationships, so teams can prioritize threats based on the data involved. This gives customers the confidence to unlock the full potential of their data without compromising security.”“The importance of cloud data has made communicating data exposure risk one of the biggest security challenges for CISOs,” said Philip Bues, senior research manager, Cloud Security at IDC. “Tenable is at the forefront of this emerging DSPM-CNAPP conversation, enabling customers to contextualize and prioritize data risk and communicate it, which is pertinent to almost every domain in CNAPP.”AI-SPM features enable customers to confidently forge ahead with AI adoption by enforcing AI and machine learning configuration best practices and securing training data. With the combined power of AI-SPM and Tenable Cloud Security’s market-leading cloud infrastructure entitlement management (CIEM) and Cloud Workload Protection (CWP) capabilities, customers can manage AI entitlements, reduce exposure risk of AI resources, and safeguard critical AI and machine learning training data to ensure data integrity. Available to all Tenable Cloud Security and Tenable One customers, these new features enable customers to:Gain complete visibility and understanding of cloud and AI data - Tenable Cloud Security continuously monitors multi-cloud environments to discover and classify data types, assign sensitivity levels and prioritize data risk findings in the context of the entire cloud attack surface. Effectively prioritize and remediate cloud risk - Backed by vulnerability intelligence from Tenable Research, context-driven analytics provides security teams with prioritized and actionable remediation guidance to remediate the most threatening cloud exposures.Proactively identify cloud and AI data exposure - Unique identity and access insights enable security teams to reduce data exposure in multi-cloud environments and AI resources by monitoring how data is being accessed and used and detect anomalous activity. Join the upcoming Tenable webinar, “Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” on October 22, 2024 at 10 am BST and 11 am ET, by registering here. Read today’s blog post, “Harden your cloud security posture by protecting your cloud data and AI resources” here. With a Net Promoter Score of 73, Tenable Cloud Security helps customers around the world expose and close priority threats. More information about DSPM and AI-SPM capabilities available in Tenable Cloud Security is available at: https://www.tenable.com/announcements/dspm-ai-spmAbout TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
of Mouvar's magic [dramatized adaptation] / Piers Anthony and Robert E. Margroff. By library.gcpl.lib.oh.us Published On :: The mysterious prophecy that has shaped the life of Kelvin Knight Hackleberry and his family seems nearly to have run its course. The Two Kingdoms that were joined by Kelvin to form Kelvinia have now been united with three others, to make a great confederation under the rule of the young twin kings, Kildom and Kildee. Kelvin has earned some time to rest with his family. Charles and Merlain are now twenty years old, and so is Dragon Horace, their brother who is the Great King of all the land. But the clouds of the last battle are gathering. The evil Professor DeVale and his witch servant Zady had been foiled in their attempt to destroy Kelvin by using his children--their evil plot has led to a stronger, more peaceful land under its rightful rulers. Now they will try one last time to pervert all that is good in the universe of the frames--and although the Prophecy of Mouvar has been accurate up to now, still there is a chance that evil will prevail. Full Article
of Moving on. Dump Your Relationship Baggage and Make Room for the Love of Your Life / Russell Friedman and John W. James. By library.gcpl.lib.oh.us Published On :: In this groundbreaking book, authors Russell Friedman and John W. James show listeners how to move on from their unsuccessful past relationships and finally find the love of their lives. Demonstrating revolutionary ideas that have worked for thousands of their clients at the Grief Recovery Institute, Friedman and James give listeners the strategies they need to effectively mourn the loss of the relationship, while opening themselves up to love in the future. With compassionate guidance, Friedman and James help listeners to close a chapter of their romantic past so that they can be ready to begin again. Full Article
of Mr. docker is off his rocker! / Dan Gutman. By library.gcpl.lib.oh.us Published On :: Mr. Docker, a new science teacher, is a crazy inventor who blows things up, uses potatoes for power, and has A.J. and his friends wondering whether science is for nerds or is the coolest subject ever Full Article