ma

Mr. mac and me / Esther Freud.

Named one of Granta's Best Young British Novelists, Esther Freud made her debut with the much-buzzed-about Hideous Kinky and has since delivered one brilliant novel after the next. Set in 1914 along the Suffolk coast, Mr. Mac and Me is the story of Thomas Maggs, whose quiet life is shaken first by the appearance of the decidedly curious Mr. Mac and then by the ravages of World War I.




ma

Mr. Macky is wacky / Dan Gutman.

Mr. Macky dresses up as Abraham Lincoln to get the students at Ella Mentry School excited about their Presidents' Day oral reports.




ma

Mr. palomar / Italo Calvino.

Mr. Palomar, whose name purposely evokes that of the famous telescope, is a seeker after knowledge, a visionary in a world sublime and ridiculous. Whether contemplating a cheese, a woman's breasts, or a gorilla's behavior, he brings us a vision of a world familiar by consensus, fragmented by the burden of individual perception. Translated by William Weaver. A Helen and Kurt Wolff Book




ma

La National Gallery presenta «Van Gogh: Poetas y amantes»

La National Gallery presenta «Van Gogh: Poetas y amantes» Con motivo de su 200 aniversario,...




ma

Los Museos de Bellas Artes de San Francisco presentan «Mary Cassatt at Work»

Los Museos de Bellas Artes de San Francisco presentan «Mary Cassatt at Work» Del 5...




ma

La colección Othmar Huber en el Albertina

La colección Othmar Huber en el Albertina Del 8 de noviembre de 2024 al 9...




ma

Mitigation Summary Report

Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.sc Continuous View has the ability to track mitigated vulnerabilities, enabling management to track and measure progress. This report provides technical managers with a clear method to communicate progress to executive management.

Throughout the report there is a continued comparison of mitigated vulnerabilities to unmitigated vulnerabilities. The first chapter provides a 3-month trend of vulnerabilities and other related charts focusing on vulnerability counts per subnet.  The second chapter provides a series of matrices with an in-depth look at vulnerabilities by severity, by CVSS score, by CVE identifier, and by Nessus and Nessus Network Manager (NNM) plugin groupings.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 5.0.1
  • Nessus 8.5.1
  • LCE 6.0.0
  • NNM 5.9.0

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. Tenable.sc Continuous View (CV) provides the ability to report on both current and mitigated vulnerabilities. With more supported technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure, Tenable.sc CV scales to meet future vulnerability management demands for virtualized systems, cloud services, and the proliferation of devices.
teams.

  Chapters

Executive Summary - This chapter provides executives with high-level understanding of vulnerability history, and which network segments are at the most risk. The first component is a 3-month trend of vulnerabilities followed by two bar charts. The bar charts provide a side-by-side comparison of vulnerability mitigation by subnet. The vulnerabilities that have been mitigated are in the top bar chart and current vulnerabilities are shown in the following chart.

Vulnerability Summaries - This chapter provides a series of matrices showing the relationship between mitigated vulnerabilities and unmitigated. The matrices are created using different criteria. The components provide an analysis using CVSS, CVE, and operating systems.
 




ma

Maintaining Data Protection Controls

Many data protection regulations, such as PCI DSS and HIPAA, levy heavy fines for data breaches of sensitive information. Effective data protection controls are necessary to avoid breaches of regulatory, statutory, or contractual obligations related to sensitive data.

Organizations that handle sensitive data, such as healthcare and credit card information, are required to audit data protection controls on an annual basis. Leveraging Tenable reports enables organizations to protect data in accordance with business risk posture for Confidentiality, Integrity and Availability (CIA).

The National Institute of Standards (NIST) Special Publication 800-53 provides comprehensive guidance for a secure infrastructure, including guidance on data protection and encryption. The information provided in Tenable dashboards and reports enables Risk Managers and Chief Privacy Officers to demonstrate to third parties and regulatory bodies that sensitive data is protected in accordance with Data Loss Prevention requirements.

The NIST Cybersecurity Framework (CSF) is a control framework, which has high level controls that align with
ISO 27001, NIST SP 800-53, and others. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. Many regulating bodies accept evidence documentation of compliance with the NIST CSF as assurance that the organization has effective controls in place to meet their security requirements. The HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework is an example of a regulation aligning with NIST.

The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report is located in the Tenable.sc Feed under the category Threat Detection & Vulnerability Assessments.

The report requirements are:

Tenable.sc 5.9.0
Nessus 10.2.0

Leveraging Tenable reports enables operations teams to verify that appropriate protections are in place for data at rest, data in transit, and removable media. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives.

Chapters

Executive Summary: This chapter provides a summary view on the state of protections controls relating to Certificates, Encryption, and Confidentiality and Protected Information.

Data Protection Details – This chapter provides details on the state of protection controls in the environment for Certificates, Encryption, and Confidentiality and Protected Information, which are described below.

  • Certificates – This section displays findings for hosts with expired certificates, certificates that are expiring soon, untrusted certificates and self-signed certificates.  Expired certificates and other certificate problems cause a denial of service, man-in-the-middle, and trust-related concerns for organizations.  
  • SSL/TLS Vulnerability Summary – This section provides an overview of systems and vulnerabilities related to SSL/TLS.  The SSL/TLS Vulnerabilities by Type element displays a count of systems and vulnerabilities related to SSLv2 and SSLv3 in the first two rows. From the third row down, information is provided on all the systems running any version of TLSv1 and higher.
  • Encryption – This section provides an overview of systems and vulnerabilities related to SSL/TLS and Encryption/Cryptographic Compliance. Information presented in this section highlights issues such as weak hashing algorithms and keys as well as the use of insecure encryption ciphers. Many of these issues are the result of misconfigurations or use of outdated encryption methods. This detailed information also highlights vulnerabilities that can be exploited by attackers. Tenable recommends that security teams review the data to determine the risk to the organization.
  • Confidentiality of Protected Information – This section provides an overview of systems and vulnerabilities related to Security Requirement 3.13.16 in the NIST Special Publication 800-171. Revision 2 provides guidance to protect the confidentiality of Controlled Unclassified Information (CUI) at rest and maps to Security Control SC-28 of NIST Special Publication 800-53.  
  • File Content Audit Results – The following section displays File Content Audit Results. The first two rows of the File Contents Audit Results Compliance Checks provide the total count of Passed checks, Failed checks, and checks requiring a manual review. The first row, ‘Check Count’, provides a count of the current checks per check status. The second row, ‘Check Ratio’, provides a ratio view of check status. The three columns together total 100%. The last two rows provide a system count analysis. The third row, ‘System Count’, provides the number of systems with at least one audit check in the applicable state. The last row, ‘System Ratio’, provides a percentage of systems with at least one audit check in the applicable state.




ma

WAS Executive Summary

From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more.  Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations.

Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this report highlights the top most vulnerable web applications and assets at risk for exploitation.

This report leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data. 

The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft. 

In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this report leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the report enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface. 

This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 6.2.0
  • Tenable Web App Scanning

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture.

Chapters

New Web Application Vulnerabilities: This chapter provides a view of web application vulnerabilities which are newly discovered. The elements summarize the first stage of vulnerabilities in the risk life cycle.  The Web Application Vulnerabilities by State matrix tracks web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets.

New OWASP 2021 Vulnerabilities: This chapter provides a view of OWASP 2021 vulnerabilities which are newly discovered. The OWASP 2021 Categories (Last 14 days) matrix displays web application vulnerabilities identified using the 2021 OWASP categories. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The OWASP 2021 Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the OWASP 2021 Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets.




ma

Dear Jacob / Sabelo Soweto Mandlanzi.

Dear reader, The fact that Jacob Zuma is the twelfth president of ANC and Jacob had twelve sons makes me sigh because folks may lie but numbers dont. Besides, Jacobs successor was Joseph while Jacob Zumas brother is Joseph, now this offsets my axis. My reasons to conduct an audit on these signs of fate finds more evidencecould Jacobs life be the pieces of the puzzle of Jacob Zumas that weve been looking for? What you see right now is the answer. Dear Jacob is a radical connection between these two Jacobs: the grandson of Abraham and the honorable president of the Republic of South Africa, Mr. Jacob G. Zuma. This is billion miles ahead of inspiration, a healthy root of the political expertise and leadership evolution. But here I focus on presenting Jacob as Jacob Zuma, human yet divine, dejected, rejected, and despised, but chosen. In this letter, the worst and the best moments of Jacob are prognostic to the life of Jacob Zuma, but negativity is to me a myth because positivity is my path. The story that brings nemesis to the enemies of positive reception is found from Genesis 25:19 and beyond in the King James Bible. I have cared for the meanings on the wall because words can start a war. Not only will you see Jacob Zuma different after reading this book, but you should be able to predict the next events that might occur as the clock of life moves toward the beginning.




ma

Dear Lady Disdain / Paula Marshall.

Running Blanchard's Bank after her father's death was fulfilling for Anastasia but, even so, she felt there was something missing from her life. Problems with the branch in York, decided Stacy. She would go herself. But the November weather turned severe and, with her retinue, she sought refuge at Pontisford Hall. It was a nightmare! The Hall was in a parlous state, and the man she thought to be the butler turned out to be Matthew, Lord Radley. He was quite as forceful and autocratic as herself, and the sparks that flew during her enforced stay had repercussions that quite appalled her.




ma

Dear lord.... Love, Efua! / Amazing Grace Louis Danso.

Efua has one dream; to make it out of Gedu village as an accomplished author. Through a rare opportunity afforded by her school, Gedu Junior Secondary School, Efua begins on a journey to achieve her dreams. On the road to success, she encounters many obstacles that seem insurmountable: lack of support from an important family member, a broken friendship, and cruelty at the hands of a virtual stranger. Her faith in God pushes her to dream big. But when trials and tribulations hit, will Efuas faith stand the test of time? Will she survive? Can she keep her dream alive? Will God grow silent or respond to the earnest prayers of a 15 year old girl who is on the verge of losing all hope? In Dear Lord Love, Efua! Amazing Grace Lois Danso, author of Bound By Kente, tells an unforgettable, touching tale of the love, faith, and hope of a young girl determined to achieve her dreams in a city that is a melting pot of hospitality and cruelty, dreams and reality, opportunities and disappointments, success and failures.




ma

Dear Maggie / Brenda Novak.

New York Times bestselling author Brenda Novak presents a suspenseful story of a woman searching for the truth. Maggie Russell, a police reporter in Sacramento, works the night shift, and she's finally stumbled on the big crime story that will truly establish her career-if it doesn't end her life. A serial killer who moves from one city to the next. As if things aren't complicated enough, Nick Sorenson, the paper's new photographer, seems to be taking an unusual interest in this case. And in her. Maggie doesn't realize that she's falling in love with a man who's not what he seems to be. A man whose deceptions may save her life.




ma

Dear Martha, WTF? : what i found in my search for why / Tricia LaVoice.

Tricia LaVoice's life turned upside-down when her parents were tragically killed in an automobile accident. Her close relationships with her mother and father made everyday life afterwards a challenge. Happily married and with a beautiful baby girl, Tricia had no time to fall apart. Over the years as her family grew, Tricia met two strong, dynamic women, both survivors of their own life challenges, whose wonderful friendships and unconditional maternal love and strength guide her to trust in life. But tragedy strikes Tricia's family again, shaking her faith in life once more. It was during this time of suffering and loneliness that she found an unexpected respite in nature, in the form of a beautiful pine tree Tricia named Martha. This rare bond inspires Tricia who literally talks to Martha daily as she heals the hurt in her heart. Tricia learns to listen to her inner voice, and heals herself by finding her source of courage and strength is within her.




ma

Dear Mary : lessons from the mother of Jesus for the modern mom / Sarah Jakes.

Hopeful, Inspiring Message for Moms from Sarah Jakes Mary, the mother of Jesus, is a remarkable example of quiet, resilient faith and courage in the face of adversity. From the angel's first announcement of her pregnancy to the death and resurrection of her son, Mary was witness to our Lord and Savior in a unique and special way. And as a mother herself, she speaks to the modern-day mom in a way few have explored before. Writing in the form of letters, Sarah Jakes examines the life of Mary--and through Mary, Jesus--to better understand what a life of faith looks like. Maybe you struggle to trust God's will for your life. Perhaps you have fears and insecurities that keep you from realizing the joy God wants for you, or the thought of raising little ones overwhelms you. Through the example of Mary, discover the freedom that only true faith can bring.




ma

Dear me sudz: the life and times of addie may / K. W. Attle.

Keith Attle 700258 : Addie May was in many ways before her time. She was strong willed, not afraid to speak her mind, and could distinguish between right and wrong with good common sense. For her, there was no middle ground. This became evident at a very early age as she was born with two strikes against her. First, one leg was shorter than the other, which caused her to limp all of her life and subjecting her to be ridiculed as a child. Secondly, she was left-handed. Today this is not an issue, but for thousands of years, this attribute was associated with witchcraft and devil possession. Addie May's mother tried everything she could to change her but to no avail. Even a sore and blistered hand and punishment by her first-grade teacher did not dissuade her. Her formal education finished at eighth grade, yet she became a court deputy, a bookkeeper for her husband's hugely successful business, a practical nurse, mother, and grandmother. It was the later when I came to know her. Death was a frequent visitor throughout her life. Somehow she was able to mask her inner emotions while smiling and comforting others facing pain, distress, and death. She was a decent, honorable, and compassionate human being who never thought of herself as anything special. This book is a tribute to a woman who never received the recognition she deserved. It is my desire to correct this. It's unfortunate she will never know.




ma

Dear Mendl, dear Reyzl : Yiddish letter manuals from Russia and America / Alice Nakhimovsky and Roberta Newman.

At the turn of the 20th century, Jewish families scattered by migration could stay in touch only through letters. Jews in the Russian Empire and America wrote business letters, romantic letters, and emotionally intense family letters. But for many Jews who were unaccustomed to communicating their public and private thoughts in writing, correspondence was a challenge. How could they make sure their spelling was correct and they were organizing their thoughts properly? A popular solution was to consult brivnshtelers, Yiddish-language books of model letters. Dear Mendl, Dear Reyzl translates selections from these model-letter books and includes essays and annotations that illuminate their role as guides to a past culture.




ma

Teuere Versäumnisse [In German]




ma

[Review of] Lutteken, Antonia. Agrar-Umweltpolitik im Tranformationsprozess -- Das Beisfiel Polen




ma

Open for Christmas :

Designed for the use of senior citizens to recall the traditions associated with Christmas in America.




ma

Investir dans la formation professionnelle des jeunes: Programme de formation professionnelle des secteurs agropastoral et halieutique du Cameroun

L’investissement dans les agriculteurs, c’est-à-dire le capital humain de l’agriculture, est crucial pour relever les défis que posent nos systèmes agroalimentaires.




ma

Rapport 2022 sur les politiques alimentaires mondiales: Changement climatique et systèmes alimentaires

Le changement climatique constitue une menace croissante pour nos systèmes alimentaires, dont les implications sont graves pour la sécurité alimentaire et nutritionnelle, les moyens de subsistance et le bien-être général, en particulier pour les personnes pauvres et vulnérables du monde entier. Une action urgente contre le changement climatique est attendue à l’échelle mondiale – à la fois pour réaliser les importantes réductions d’émissions requises pour limiter le réchauffement climatique et pour accroître les capacités d’adaptation et la résilience.




ma

Données de population sur la République démocratique du Congo : Peut-on réduire les marges d'imprécision ?




ma

Une analyse comparative des méthodes de mise á jour et de rééquilibrage des matrices de comptabilité sociale

Les modèles d’équilibre général calculable (MEGC), largement admis dans la littérature et utilisés comme outils d’analyse d’impacts potentiels de politiques économiques, sont alimentés par des données provenant de la Matrice de Comptabilité Sociale (MCS). Celle-ci appartient à la grande famille des comptes nationaux, représentant l’ensemble des interrelations entre les activités, les institutions d’une économie.




ma

Politiques en matière de nutrition en Afrique de l’Ouest

Cette note propose un résumé des politiques, stratégies et plans d’action ayant trait à la nutrition (désignés ici sous le terme de « politiques ») en Afrique de l’Ouest.




ma

Analyse des flux physiques, performances économiques et relations au sein des filières de manioc, de riz, de lait et de poisson au Sud-Kivu et Tanganyika (RDC 2021)

Ce document présente une analyse des chaînes de valeur agroalimentaires de manioc, de riz, de lait et de poisson le long du corridor économique entre les capitales provinciales de Bukavu (Sud-Kivu) et Kalemie (Tanganyika) situées dans la partie orientale de la République démocratique du Congo (RDC). Les principales données utilisées pour cette étude proviennent d’enquêtes menées en 2021 auprès d’environ 3000 acteurs conomiques familiaux, y compris des agriculteurs, des transformateurs et des intermédiaires, actifs dans une ou plusieurs des quatre filières ciblées.




ma

Mary Cassatt at Work at the Fine Arts Museums of San Francisco

Mary Cassatt at Work at the Fine Arts Museums of San Francisco From October 5,...




ma

The Met presents the first major exhibition in the US focusing on early Sienese painting

The Met presents the first major exhibition in the US focusing on early Sienese painting...




ma

Louvre puts the focus on Watteau’s enigmatic “Pierrot”

Louvre puts the focus on Watteau’s enigmatic “Pierrot” From October 16th, 2024 to  February 3rd,...




ma

The Othmar Huber Collection at the Albertina

The Othmar Huber Collection at the Albertina From 8 November 2024 to 9 February 2025,...




ma

CIS Audit Summary

When dealing with compliance regulations, each organization can face a variety of potential risks. Without having a full understanding of an organization’s risk exposure, critical systems and data will be at risk for attacks or data leakage. The Center for Internet Security (CIS) developed a series of best practice benchmarks for a variety of applications, operating systems, servers, and databases used within organizations today. Each benchmark contains recommended security settings designed to harden systems and applications from attack while maintaining overall system functionality. The components in these dashboards present a summary of results gathered from CIS compliance scans using the CIS Benchmarks.

Tenable has been certified by CIS to perform a wide variety of platform and application audits based on the best practice consensus benchmarks developed by CIS. Tenable submits example test cases for all of the criteria within each unique benchmark, and then submits our results to CIS personnel for official certification. Tenable has developed audit files based on the CIS Benchmarks tested on systems, and has been approved and certified by CIS staff members.

When performing managed scans with Tenable.sc, some CIS audits require additional patch audits and vulnerability checks. Any additional requirements for completing an audit using the CIS Benchmarks will be included within the audit file description text. In some cases, multiple scans may be required, as Tenable provides both Level 1 and Level 2 audit checks. Level 1 checks provide minimum settings recommendations, and are generally considered safe to apply to most systems. Level 2 checks include recommendations for complex or highly secure environments, and can lead to reduced functionality of systems within the network.

Information presented within these dashboards includes a summary of CIS audit checks currently supported by Tenable. Results will highlight one of three severity levels that will provide valuable information analysts can use to harden systems within the enterprise. The informational severity level is considered “Passed”, indicating that the configuration setting matches the expected result of the audit check. Results assigned a medium severity must be evaluated by an analyst to determine whether the results are accurate or not. When an audit check fails, the severity is set to high, indicating that the collected result and the expected result do not match. Each failure should be reviewed, fixed, and re-scanned to ensure that the system has been secured properly. Using these benchmarks will help to assess the effectiveness of existing security controls on systems, and provide the critical context needed to strengthen an organization's security posture.

If needed, audit files can be modified to an organization’s specific requirements. Additional information on how to edit audit files can be found within the “Nessus Compliance Checks” document in the Support Portal.

These dashboards are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboards can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are:

  • Tenable.sc 5.2.0
  • Nessus 8.6.0
  • CIS Audit Files
  • Compliance Data

In order to maintain the overall security of systems and data within the enterprise, organizations must have an effective and repeatable way to measure compliance results. Tenable Tenable.sc helps organizations obtain results using the CIS Benchmarks by measuring compliance in real time, providing an accurate assessment of an organization’s security posture. By prioritizing remediation actions of misconfigured systems, the organization can maximize their investment in compliance reporting and system hardening efforts. With more supported technologies than any other vendor, Tenable assists organizations in obtaining the most comprehensive view of the network and the intelligence needed to assess and protect systems using CIS compliance standards.

There are 3 dashboards with over 40 individual components. As with all dashboards in Tenable.sc, individual components can be rearranged, edited, or removed to focus on the components of interest. To edit or delete a component, click on the Gear menu in the upper-right title area of a component and select the appropriate menu item. Components can be rearranged using drag and drop. To change the visual display of the entire dashboard, for example from 3 columns to 2 columns or 1 column, from the Options menu select Edit Dashboard and select a layout style.  

The following dashboards are available:

  • CIS Audit Summary (Networking and Applications): This dashboard provides the components for application servers (Apache, MongoDB, Oracle, RDMS), networking or container based services (Cisco, Docker, Kubernetes, Palo Alto, VMwareESXi) and other similar benchmarks.
  • CIS Audit Summary (Microsoft): This dashboard provides the components for all Microsoft benchmarks, including servers, workstation, and various other applications.  
  • CIS Audit Summary (Linux Benchmarks): This dashboard provides the components for AlmaLinux, Rocky Linux, Amazon Linux, CentOS, Debian, Fedora, HP-UX, macOS, NGINX, RedHat, SUSE, and other similar operating systems.




ma

WAS Executive Summary

From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more. Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations.

Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this dashboard highlights the top most vulnerable web applications and assets at risk for exploitation.

This dashboard leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data.

The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft.

In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this dashboard leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the dashboard enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface.

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. The requirement for this dashboard is: Tenable Web App Scanning.

Components

Top 100 Most Vulnerable Web Applications (Last 14 Days): The table displays a list of the vulnerabilities the application from most severe to least severe. This information enables analysts to prioritize remediation efforts by identifying the top vulnerabilities to remediate that will reduce the organization's overall attack surface. 

Top 100 WAS Vulnerabilities by Plugins (Last 14 Days): This table provides a list of Web Application vulnerabilities that have been seen within the last 14 days as well as the total number of instances of each vulnerability. The Plugin Family is displayed as well as the Plugin ID and Severity of each vulnerability. This information enables analysts to prioritize remediation efforts by identifying the top vulnerabilities to remediate that will reduce the organization's overall attack surface. 

Web App Vulnerabilities by State: This matrix provides a view into the vulnerability life cycle for web applications. Tracking web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts.

Top 2021 OWASP Categories Discovered in the Last 14 Days: This matrix displays active Web Application vulnerabilities from Tenable Web App Security by OWASP category for 2021. Displayed is a row for assets and vulnerabilities for each OWASP category. 




ma

Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal

Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal

Integrating key goals of food system transformation.

The post Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal appeared first on IFPRI.




ma

Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles

Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles

Enfoques para el desarrollo de políticas del sistema alimentario.

The post Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles appeared first on IFPRI.




ma

Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria

Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria

Examining the effectiveness of vouchers and marketing information.

The post Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria appeared first on IFPRI.






ma

From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia

From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia

The power of bundled solutions

The post From risk to resilience: How strategic government partnerships can enhance access to insurance-linked credit for smallholders in Zambia appeared first on IFPRI.





ma

PenderFund Capital Management Ltd.

HeadnotePursuant to National Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief from the prohibition on the use of corporate officer titles by certain registered individuals in respect of institutional clients -- Relief does not extend to interact




ma

Canada Life Investment Management Ltd.

HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Exemption granted to existing and future alternative investment funds from the margin deposit limits in subsection 6.8(1) and paragraph 6.8(2)(c) of NI 81-102 to permit each fund to depo




ma

1832 Asset Management L.P.

HeadnoteNational Policy 11-203 -- Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from NI 41-101 to funds offering exchange-traded and conventional mutual fund series under a single simplified prospectus -- subject to conditions -- Technical relief g




ma

Why irrational politics appeals : understanding the allure of Trump / Mari Fitzduff, editor.




ma

Churchill and Orwell : the fight for freedom / Thomas E. Ricks.

"From #1 New York Times bestselling author Thomas E. Ricks, a dual biography of Winston Churchill and George Orwell, with a focus on the pivotal years from the mid-1930s through the 1940s, when their farsighted vision and inspired action in the face of the threat of fascism and communism helped preserve democracy for the world. Both George Orwell and Winston Churchill came close to death in the mid-1930's— Orwell shot in the neck in a trench line in the Spanish Civil War, and Churchill struck by a car in New York City. If they'd died then, history would scarcely remember them. At the time, Churchill was a politician on the outs, his loyalty to his class and party suspect. Orwell was a mildly successful novelist, to put it generously. No one would have predicted that by the end of the 20th century they would be considered two of the most important people in British history for having the vision and courage to campaign tirelessly, in words and in deeds, against the totalitarian threat from both the left and the right. Together, to an extent not sufficiently appreciated, they kept the West's compass set toward freedom as its due north. It's not easy to recall now how lonely a position both men once occupied. By the late 1930's, democracy was discredited in many circles, and authoritarian rulers were everywhere in the ascent. There were some who decried the scourge of communism, but saw in Hitler and Mussolini 'men we could do business with,' if not in fact saviors. And there were others who saw the Nazi and fascist threat as malign, but tended to view communism as the path to salvation. Churchill and Orwell, on the other hand, had the foresight to see clearly that the issue was human freedom— that whatever its coloration, a government that denied its people basic freedoms was a totalitarian menace and had to be resisted. In the end, Churchill and Orwell proved their age's necessary men. The glorious climax of Churchill and Orwell is the work they both did in the decade of the 1940'sto triumph over freedom's enemies. And though Churchill played the larger role in the defeat of Hitler and the Axis, Orwell's reckoning with the menace of authoritarian rule in Animal Farm and 1984 would define the stakes of the Cold War for its 50-year course, and continues to give inspiration to fighters for freedom to this day. Taken together, in Thomas E. Ricks's masterful hands, their lives are a beautiful testament to the power of moral conviction, and to the courage it can take to stay true to it, through thick and thin." -- Provided by publisher.




ma

MacArthur's spies : the soldier, the singer, and the spymaster who defied the Japanese in World War II / Peter Eisner.

The true story of three intrepid people who successfully eluded the Japanese in Manila for more than two years, sabotaging enemy efforts and preparing the way for MacArthur's return. One was a debonair polo-playing expatriate businessman who was also a U.S. Navy intelligence officer. Another was a defiant enlisted American soldier. And the third was a wily American woman, an intinerant torch singer with many names and almost as many husbands. With ample doses of intrigue, drama, skulduggery, sacrifice, and romance, this book has all the complicated heroism and villainy of the best war novels. But it is, in the end, a true tale of courage when it counted the most. -- adapted from book jacket.




ma

The Jersey brothers : a saga of war and family / Sally Mott Freeman.

Documents the extraordinary story of three brothers in World War II, describing the rescue mission launched by the elder two when their youngest brother was declared missing in action in the Philippines.




ma

Ruthless river : love & survival by raft on the Amazon's relentless Madre de Dios / Holly Conklin FitzGerald.

The author describes how her honeymoon was cut short when her plane crashed in the jungles of Peru, forcing her and her husband to try to survive aboard a makeshift raft as they made their way down the Amazon River to civilization.




ma

Explorer's guide. Cape Cod, Martha's Vineyard & Nantucket, [2017] / Kim Grant ; with photographs by the author.

Features recommendations for dining, lodging, transportation, shopping, recreational activities, landmarks, and cultural opportunities. -- Publisher.




ma

Eyewitness travel. Canary Islands, [2017] / main contributors, Piotr Paszkiewicz, Hanna Faryna-Paszkiewicz, Gabriele Rupp.

Provides background information on the Canary Islands; describes the major sights, and suggests hotels, restaurants, entertainment, and outdoor activities.




ma

Lonely planet. Pocket Reykjavík, [2017] : top experiences, local life, made easy / Alexis Averbuck.

Lonely Planet: The world's leading travel guide publisher Lonely Planet's Pocket Reykjavik is your passport to the most relevant, up-to-date advice on what to see and skip, and what hidden discoveries await you. Jump on a whale-watching boat at Reykjavik's Old Harbour, peruse priceless artefacts at the National Museum, or wash away your cares at the ethereal Blue Lagoon geothermal waters set in otherworldly lava fields; all with your trusted travel companion. Get to the heart of Reykjavik and begin your journey now! Inside Lonely Planet's Pocket Reykjavik: *Full-colour maps and images throughout *Highlights and itineraries help you tailor your trip to your personal needs and interests *Insider tips to save time and money and get around like a local, avoiding crowds and trouble spots *Essential info at your fingertips - hours of operation, phone numbers, websites, transit tips, prices *Honest reviews for all budgets - eating, sleeping, sight-seeing, going out, shopping, hidden gems that most guidebooks miss *Free, convenient pull-out Reykjavik map (included in print version), plus over 13 colour maps *Covers Old Reykjavik, Old Harbour, Laugavegur & Skolavordustigur, Laugardalur, Videy Island, Blue Lagoon, Reykjanes Peninsula, Golden Circle, South Coast, Jokulsarlon, West Iceland and more The Perfect Choice: Lonely Planet's Pocket Reykjavik, a colorful, easy-to-use, and handy guide that literally fits in your pocket, provides on-the-go assistance for those seeking only the can't-miss experiences to maximize a quick trip experience. * Looking for a comprehensive guide that recommends both popular and offbeat experiences, and extensively covers all of Iceland? Check out Lonely Planet's Iceland guide. * Looking for more extensive coverage? Check out Lonely Planet's Scandinavia guide for a comprehensive look at all the region has to offer. Authors: Written and researched by Lonely Planet and Alexis Averbuck. About Lonely Planet: Since 1973, Lonely Planet has become the world's leading travel media company with guidebooks to every destination, an award-winning website, mobile and digital travel products, and a dedicated traveller community. Lonely Planet covers must-see spots but also enables curious travellers to get off beaten paths to understand more of the culture of the places in which they find themselves.