ar

Vancouver Alumni Holiday Party

Starts: Tue, 10 Dec 2024 19:00:00 -0500
12/10/2024 05:00:00PM
Location: Vancouver, Canada




ar

WLP Vancouver Holiday Social & Networking Event with Martha Piper!

Starts: Wed, 11 Dec 2024 19:00:00 -0500
12/11/2024 05:00:00PM
Location: Vancouver, Canada




ar

MAA Ottawa: Holiday Party

Starts: Wed, 11 Dec 2024 22:00:00 -0500
12/11/2024 06:00:00PM
Location: Ottawa, Canada




ar

MAA New York: McGill Alumni Holiday Party

Starts: Thu, 12 Dec 2024 21:00:00 -0500
12/12/2024 07:00:00PM
Location: New York, U. S. A.




ar

Calgary Holiday Party - Holiday Glamour at Lougheed House

Starts: Sat, 30 Nov 2024 19:00:00 -0500
<div>Join us for a magical evening of holiday cheer at the <b>McGill Alumni Association of Calgary</b>'s <b>Holiday Soirée</b>!</div><div><br /></div><div>Immerse yourself in the historic ambiance of Lougheed House as we celebrate the season with festive decorations, delightful canapés, and a cash bar.&nbsp;</div><div><br /></div><div>This is your chance to dress up, socialize, make new friends, and reconnect with old ones-all while enjoying a fun evening with our community. <br /><br /></div><div><i>Get ready to be enchanted by the spirit of the holidays! <br /></i></div>
Location: Calgary, Canada




ar

Native American Religion in Early America

Teaching about Native American religion is a challenging task to tackle with students at any level.




ar

Civil War: The Southern Perspective

The Civil War began with a largely symbolic battle at Fort Sumter, a battle in which the only fatality was a (southern) horse.




ar

How to Read a Slave Narrative

New essay by William L. Andrews just added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




ar

Frederick Douglass and Harriet Jacobs: American Slave Narrators

New essay by Lucinda MacKethan just added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




ar

The Image of Africa in the Literature of the Harlem Renaissance

New essay by Trudier Harris, "The Image of Africa in the Literature of the Harlem Renaissance," added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




ar

Jazz and the African American Literary Tradition

New essay, "Jazz and the African American Literary Tradition," by Gerald Early, Merle Kling Professor of Modern Letters at Washington University in St. Louis, added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




ar

Summary of Comments to CSA/CIRO Staff Notice 23-331 Request for Feedback on December 2022 SEC Market Structure Proposals and Potential Impact on Canadian Capital Markets

This document is only available in PDF format.




ar

Detailed Data on Balance of Issuers in ninth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions




ar

CSA Multilateral Staff Notice 58-317 - Review of Disclosure Regarding Women on Boards and in Executive Officer Positions - Year 10 Report

This document is only available in PDF format.




ar

Detailed Data on CSA Multilateral Staff Notice 58-317 Report on tenth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions




ar

CSA Notice Regarding Coordinated Blanket Order 96-932 Re Temporary Exemptions from Certain Derivatives Data Reporting Requirements

This document is only available as a PDF.




ar

Ontario Securities Commission – Coordinated Blanket Order 96-932

This document is only available as a PDF.




ar

OSC Staff Notice 81-736 - Summary Report for Investment Fund and Structured Product Issuers

This document is only available in PDF format.




ar

CSA Staff Notice 51-365 Continuous Disclosure Review Program Activities for the Fiscal Years Ended March 31, 2024 and March 31, 2023

This document is only available in PDF format.




ar

Research Analyst I/II

Job Summary The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Research Analyst I/II in its Development Strategies and Governance Unit. This position is a one-year, renewable appointment, based at IFPRI’s office in New Delhi, India. The Successful candidate will have experience in using mixed methods for research and excellent writing skills. Interested applicants must have work authorization to work in India. The final grade level will be determined by level of education and years of relevant work experience. Essential Duties:  Specific duties and responsibilities include but are not limited to: Assist with the analysis of climate-smart agricultural (CSA) technologies and interventions and their increasing significance as part of agricultural adaptation in the wake of climate change, particularly in the developing countries. Assist in conducting cost-benefit analysis, constraint analysis, and policy analysis to estimate the extent to of CSA adoption in the South Asia region.  Conduct data analysis (using primary and secondary), statistical and econometric analysis. Familiarity with trade-related data and data sources to assist with the analysis of trade barriers (tariff and non-tariff) associated with various CSA technologies. Preparation of analytical reports and peer-reviewed publishable papers using information from primary surveys and secondary data. Assist in the preparation of project reports, policy briefs and journal articles. Conduct literature reviews & synthesis. Verify or triangulate key data to ensure the robustness and relevance of it in developing indices. Regular travel and meetings with various stakeholders including government officials, extension agents, local service providers, and farmers to gather inputs for drafting reports. Assist in organizing high level policy forum, workshops and seminars. Required Qualifications:  At the Research Analyst I level, Bachelors’ degree plus two years of relevant experience, or Master’s degree in Economics, Rural Development, Public Policy, or a closely related field. At the Research Analyst II level, Master's degree in the above-mentioned fields plus three years of relevant post Master’s work experience. Demonstrated experience working with large quantitative data sets (data cleaning, management, analysis, etc.) Knowledge of standard econometric tools Excellent Stata, data visualization (Tableau/Power BI), MS Excel and ArcGIS skills (knowledge of ArcGIS and Tableau/Power BI is not compulsory)  Demonstrated strong writing skills. Fluency in written and spoken English and Hindi Ability to work independently, with initiative and minimal supervision. Preferred Qualifications:  Experience in fieldwork, using mixed methods for research. Experience in designing and conducting focused group discussions, semi-structured interviews, and analysis of policy documents.   Experience working in rural South Asia Experience in liaison and coordination with ministries and departments.  Physical Demands and Work Environment Employee will sit in an upright position for a long period of time. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading.  




ar

Research Analyst I/II

Job Summary   The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Research Analyst I/II in its Development Strategies and Governance Unit. This position is a one-year, renewable appointment, based at IFPRI’s office in New Delhi, India. Successful candidate will engage in quantitative research to generate empirical evidence on efficiency in agricultural research & development, impact of agricultural technologies, farm credits & insurance, innovations in input delivery systems, linkages between agriculture and nutrition etc. Job duties will include support to quantitative data analysis, literature reviews including policy and program reviews and assistance in the preparation of reports and journal manuscripts. The RA is expected to support policy and stakeholder communications activities also. Interested applicants must have work authorization to work in India. The final grade level will be determined by level of education and years of relevant work experience. Essential Duties:  Specific duties and responsibilities include but are not limited to: Assist in various tasks involving Data collection, compilation, cleaning, and analysis of primary and secondary data from various sources.          Coordinate and manage large field surveys. C onduct literature reviews and synthesize findings. Perform economic modeling and statistical analysis. Facilitate coordination between collaborators and stakeholders.                                             Assist in the drafting and editing of research papers, blogs, policy briefs, technical guidance, presentations, etc. Perform other duties as assigned. Required Qualifications:  Research Analyst I: Bachelor’s degree in Economics, Agricultural Economics, Statistics, Agricultural Statistics plus two years of professional experience or Master’s degree in closely related field. Research Analyst II: Master’s degree in one of the above fields plus minimum three years of post-master’s relevant experience. Skills in quantitative research methods and data analysis. Experience of using Stata software for data analysis. Fluency in written and spoken English. Excellent interpersonal skills along with the ability to work independently and with colleagues from diverse cultures. Ability to manage multiple tasks and produce completed products in time. Ability to work independently, with initiative and minimal supervision. Preferred Qualifications:  Experience in handling large agricultural and household survey data from developing countries. Demonstrated strong writing skills. Physical Demand & Work environment: Employee will sit in an upright position for a long period of time.  Employee will lift between 0-10 pounds.    Employee is required to have close visual acuity to perform activities such as: data preparation, web-scraping, preparing, and analyzing data and figures; dashboard; viewing computer terminal; extensive coding.  




ar

Research Assistant/ Research Analyst I

Job Summary: The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Research Assistants/ Research Analyst I in its Development Strategies and Governance Unit for the Sudan Strategy Support Program. This is a one-year, renewable appointment. The successful candidates will work with senior research staff in the analysis of agriculture, rural development, food and nutrition security and related policies and other research activities including research work related to the ensuing conflict in Sudan. The incumbent will work under the overall guidance of the IFPRI Sudan Program Leader but will be employed directly by IFPRl's organizational host, the Arab Organization for Agricultural Development (AOAD) - employment policies, compensation, and benefits of AOAD will apply to this position. Interested applicants must have authorization to work in Sudan. The final grade level will be determined by level of education and years of relevant work experience. Essential Duties: Specific Duties include but are not limited to: Assist the collection of primary and secondary data, Asist build large dataset from multiple sources, Assist to analyze data using advance analytical methods, Assist in conducting literature reviews and synthesis, Assist in drafting and translating reports, research papers, and blog posts between English and Arabic languages, Assist in capacity building and support outreach activities, Assist to coordinate projects and conduct other duties as assigned. Required Qualifications:  Research Assistant: Bachelor's or its equivalent in Economics, Agricultural Economics, Statistics, or closely related fields, Research Analyst: Bachelor’s degree plus two years of relevant professional experience or Master’s degree in a relevant discipline, Excellent knowledge of macroeconomic and/or microeconomic theory, Excellent knowledge of and quantitative econometric methods and/or economic modeling, Excellent knowledge of Stata and/or GAMS, Excellent analytical mind and drafting skills, Demonstrated fluency in written and spoken English and Arabic , Excellent interpersonal skills and to work in a team-oriented multi-cultural environment, Demonstrated ability to multi-task, meet deadlines, and manage time, Demonstrated professional level of attention to detail and accuracy of work, Ability to work independently and take initiative, Willingness to travel. Preferred Qualifications: Previous experience conducting research on and collecting data in Sudan. Familiarity with the literature on economic and agriculture development, food security, poverty reduction and related fields. Previous experience related to policy analysis and impact evaluation. Experience with spatial analysis and ARC-GIS. Experience with policy communication activities and events organization. Experience with managing websites and updating their contents. Experience in academia, the private sector, a development-oriented organization, or comparable institution,   Physical Demand & Work environment Employee will sit in an upright position for a long period of time. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading.  




ar

Research Unit Contracts & Grants Manager I

The Development Strategies and Governance (DSG) Unit within the Transformation Strategies Department of the International Food Policy Research Institute (IFPRI) seeks a Research Unit Contracts & Grants Manager I, who will be responsible for financial management which includes budgetary responsibilities, cost monitoring and control, and financial analysis and reporting, contracts administration which includes proposal preparation and submission and the administration of the Unit’s special projects. Other responsibilities include supervising Unit Admin Support staff, serving as liaison with finance and administration as well as the Director General’s office; drafting correspondence for the Unit director and communication with external contacts (donors, clients, collaborators, sub-contractors and auditors); and service as active member on various standing and ad-hoc committees, as well as work with Project Managers in management of budgets, contracts, deliverables, invoices and other payment documents. This position is a 2-year, renewable appointment based in Washington, DC.   Essential Duties: Specific duties and responsibilities include but are not limited to: Providing technical support in proposal preparation, reviewing contracts to ensure they reflect the provisions negotiated, and monitoring performance of contracts and submission of specified deliverables.  Drafting, negotiating and monitoring consultant collaborative agreements, serve as liaison between program collaborators and finance/administrative issues, review monthly financial reports, and provide financial analysis reports on projects.  Preparing the divisional budgets and monitoring expense budgets Coordinating the drafting of project/program budgets; review of accounting transactions.  Developing spreadsheets & maintaining financial information for planning & reference. Drafting routine correspondence regarding contracts or project/program finances. Assisting in financial audits Coordinating financial and operational activities for field offices Ensuring the smooth operation of the program’s day-to-day activities; coordinate seminars and workshops, manage logistical arrangements on seminars/workshops. Liaising with IFPRI HR Services, Facilities and IT department for related issues and needs. Preparing administrative and operational procedures for the division and approves timesheets Maintaining division files Supervising administrative support staff Other tasks as assigned. Required Qualifications:  Bachelor’s degree plus ten years of relevant experience, or associate’s degree plus twelve years of relevant experience.   Two year of management experience Experience in developing, monitoring and managing budgets and contracts. Experience in coordinating budget processes, reviewing accounting transactions, developing financial projections and reports. Solid composition, grammar and proof-reading skills, with the ability to compose correspondence and reports; excellent written and oral English communications skills. Proficient in Microsoft Office; word processing & spreadsheet programs required. Ability to handle multiple tasks & prioritize tasks with minimal supervision in a fast-paced environment. Demonstrated experience and comfort working with multiple program managers simultaneously.  Ability to prioritize and coordinate tasks in such an environment. Demonstrated flexibility to adjust to multiple individual work styles.  Attention to detail and ability to work within a team in a multicultural environment.   Preferred Qualifications: Familiarity with IFPRI’s operational systems (finance, accounting, etc.) and the CGIAR system is highly desirable.  Proficiency in a second language of the U.N. system Demonstrated proficiency with MS Office, especially Microsoft Word, Outlook, Excel, and PowerPoint required, and demonstrated proficiency with financial management and administrative software applications such as Costpoint, OnBase, Deltek, and/or other applications. Physical Demand & Work environment: Employee will sit in an upright position for a long period of time  Employee will lift between 0-10 pounds.  Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range: The expected salary range for this job requisition is between $85,600- $104,900. In determining your salary, we will consider your experience and other job-related factors.  Benefits: IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing a strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits can be found on our website. Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US-based employees who work at least 25 hours per week. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity.




ar

Senior Research Fellow I/II

Job Summary: The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Senior Research Fellow (SRF I or SRF II) for a two-year, renewable appointment for its Nutrition, Diets and Health Unit. This position is based at IFPRI headquarters located in Washington, D.C but would involve travel to any of the countries in which IFPRI carries out its research. The SRF I/II would manage complex, multi-partner surveys and evaluations, mentor junior research staff, lead the development of new research activities, including developing proposals for the evaluation of multisectoral programs and food systems approaches to improving diet, nutrition and health outcomes in low- and middle-income countries. In addition, the SRF I/II would lead research activities related to the CGIAR Research Initiative on Fruit and Vegetables for Sustainable Healthy Diets (FRESH) which would include leading the co-development of programmatic activities (with program implementation partners) to increase intake of fruit and vegetables. Essential Duties:   Specific duties include but are not limited to: Conducting research related to diets, nutrition, health, and well-being in low-and middle-income countries and the impact of multisectoral programs and/or food systems approaches on these types of outcomes.  Developing and managing large/complex research projects and/or programs including developing workplans, coordinating research activities, monitoring and reporting on progress and sharing research findings with diverse audiences.  Design and supervise large-scale data collection activities such as household surveys, food environment surveys, dietary assessment surveys and nutritional status assessments.   Supervising the work of various research support staff and providing professional mentoring to others.  As part of multisectoral program and/or food systems evaluation activities, work closely with program implementation partners and other key stakeholders, to identify and oversee the design of programmatic activities to address constraints to sustainable, healthy diets. Recruiting and managing national collaborators. Developing and monitoring of the project or program budget. Publishing research in peer-reviewed publications. Providing strong research leadership in developing new ideas into proposals. Preparing donor and other project/program reports. Liaising with donor & senior government and other types of stakeholders on projects Communicating research to a broad spectrum of stakeholders (researchers, academicians, policy makers, local partners. Required Qualifications: At the Senior Research Fellow I level:  PhD in Nutrition, Public Health, Epidemiology, International Development, or closely related field and a minimum of 7 years of post-PhD experience. At the Senior Research Fellow II level:  PhD in Nutrition, Public Health, Epidemiology, International Development, or closely related field and a minimum of 10 years of post-PhD experience Major external recognition within peer professional network due to publications and other leaderships activities. Extensive publication record in peer-reviewed journals. Strong skills in quantitative data analysis Demonstrated ability to perform critical analyses of own & others’ research.  Sustained and consistent excellent publications record in peer-reviewed journals.  Demonstrated leadership skills and strong experience building and managing teams. Demonstrated leadership in developing global research programs with policy recommendations. Demonstrated experience in effective interactions in a multicultural setting with other researchers and with policymakers, donors, and civil society, facilitating impact of research & capacity strengthening. The ability to effectively contribute to IFPRI’s overall institutional value through demonstrated participation and support for organization-wide programs and activities. Willingness to travel extensively as required. Excellent written and spoken English communication skills with demonstrated excellence in written and oral presentations. Demonstrated computer literacy (PC and Microsoft Applications).  Proven record of fundraising success for broad and complex programs and projects. Preferred Qualifications: Proficiency in a second language of the U.N. system Dietary assessment and analysis expertise Experience with qualitative assessment methods and associated analytic techniques and software. Physical Demand and Work Environment: Employee will sit in an upright position for a long period of time.  Employee will lift between 0-10 pounds.  Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range : The expected salary ranges for this job requisition are between 24 R : $135,400 -  $169,300 ; 25 R: $159,800 -  $199,700 .  In determining your salary, we will consider your experience and other job-related factors. Benefits IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing a strong overall employee experience. This position is eligible for health insurance coverage and a  summary of our benefits can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US based employees who work at least 25 hours per week. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity.




ar

Associate Research Fellow / Research Fellow

Job Summary The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as an Associate Research Fellow or Research Fellow. This is a two-year, renewable, exempt appointment based at IFPRI’s Washington, DC Office.  The ideal candidate will have demonstrated aptitude with modeling water resources and hydrologic systems at multiple scales, experience in developing and operating modeling suites that link biophysical and economic models, and interest/experience in the analysis of risk and uncertainty. The successful candidate will work on interdisciplinary teams to conduct research, produce high-impact publications and disseminate knowledge that (for example): assists national level policy-making units confront the challenges posed by climate change and water constraints; fosters regional strategies for resilient growth and development in a context of climate change; works with CGIAR partners on research and/or model development, particularly in IWMI; and assists key agri-food system actors in low- and middle-income countries (LMICs) and other constituencies in the formation of investment plans in water resources, including in relation to food and energy. Specific areas of research are expected to be developed in accordance with the intersection of the interests and skills of the successful candidate and the objectives of the Foresight and Policy Modeling Unit. It is anticipated that about 80 percent of the job will be dedicated to applied research, and the remaining 20 percent will be allocated to capacity-building, policy engagement, and outreach activities supporting evidence-based decision-making. Essential Duties  Specific duties include but are not limited to:  ·          Lead development, maintenance, and improvement of IFPRI’s water data and modeling systems compatible with global (IMPACT) and national levels (RIAPA). ·          Contribute to scenario development, modeling and analytics supporting a variety of foresight-related research projects. ·          Lead focused studies on water-related issues relevant for food system transformation globally and in LMICs. ·          Work with other modelers in the Foresight and Policy Modeling unit to maintain and improve water modeling components of established modeling frameworks. ·          Conduct research in the service of the CGIAR’s mission to advance positive transformation of food, land, and water systems. ·          Support efforts to strengthen the capacity of partner organizations and networks to conduct scholarly research and communicate evidence-based policy recommendations. ·          Prepare project reports, research papers, presentations, and peer-reviewed journal articles in collaboration with CGIAR researchers, other collaborators, and partners. ·          Regularly communicate research outputs via policy seminars, policy briefs, and peer-reviewed publications to a broad spectrum of stakeholders, including researchers, academics, policymakers, and government officials. ·          The successful candidate will work with a multi-disciplinary and multi-cultural team of researchers and is expected to engage in a broad range of research projects and activities consistent with the research program of the Foresight and Policy Modeling Unit. Required Qualifications ·          PhD in Water Resources Engineering, Hydrology, or closely related field ·          Significant expertise in using water resources systems and hydrologic models and experience or interest to link these to economic and other simulation models at global, regional and national levels to evaluate policies related to food, land, and water systems. ·          Demonstrated capabilities in quantitative analysis and ability to use spatial data and methods in innovative and policy-relevant ways to examine water resource management issues in the context of climate change and other major drivers. ·          Ability or willingness to work in the GAMS modeling environment and code, other math/statistical programming languages, and GIS. ·          Experience using river basin modeling tools, (e.g. Mike Hydro Basin, WEAP, and Riverware). ·          Strong interpersonal skills and ability to work well both with a team and independently. ·          Ability to work in a dynamic environment, take initiatives to resolve issues and effectively work with minimal supervision. ·          Excellent written and verbal communication skills in English. ·          Willingness to travel extensively (including internationally) as required. Preferred Qualifications ·          Ability to work in Python. ·          Relevant research experience as applied to LMIC country contexts in Africa, Asia, and/or Latin America. ·          Demonstrated ability to produce high-quality written reports, oral presentations, blog posts, and/or other forms of written and oral communications associated with scholarly research outputs. Additional requirements at the Research Fellow level ·          At least 3 years of post-PhD experience relevant to the job and demonstrated fundraising experience. ·          Strong publication record in peer-reviewed journals. ·          Major external recognition within professional peer network based on publications and other leadership activities. ·          Demonstrated leadership skills and successful experience building and managing teams. Physical Demand & Work environment ·          Employee will sit in an upright position for a long period of time ·          Employee will lift between 0-10 pounds. ·          Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range :  The expected salary range for this job requisition is between $85,600 - $107,000. In determining your salary, we will consider your experience and other job-related factors. Benefits : IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits  can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US-based employees who work at least 25 hours per week. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity.    




ar

Research Analyst I

Job Summary The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Research Analyst in its Development Strategies and Governance Unit (DSG). This is one-year, non-renewable appointment based in Yangon, Myanmar, and may include travel and extended stays in different parts of rural Myanmar. The successful candidate will work on several research projects, involving household survey data collection and analysis. Interested applicants must be authorized to work in Myanmar. Essential Duties: Specific Duties include but are not limited to: Collection, cleaning, and analysis of primary and secondary data Assist in handling household survey data (including survey design, sampling & questionnaire) Assist with development of research instruments and analytical tools Conduct data analysis, statistical analysis, econometric analysis Conduct literature reviews & synthesis Contribute to the writing of discussion papers, donor reports, and other scholarly publications. Coordinate field implementation of survey activities (scoping, pretesting, training survey enumerators, etc.) Prepare large datasets for public access Develop data documentation manuals or other learning materials, as needed Help develop & coordinate technical workshops Interact with collaborators and project partners. Other duties as assigned Required Qualifications: Bachelors degree in Economics, Agricultural Economics, International Development or related field plus two years of professional experience or a Master’s degree in a relevant discipline. Experienced in conducting literature reviews of academic publications, research reports, etc. Demonstrated experience in coordinating activities in the field. Demonstrated experience in effective interaction and coordination with collaborators and project partners. Demonstrated experience working with large quantitative data sets (data cleaning, management, analysis, etc.) Demonstrated ability to perform in-depth statistical analysis and report the results. Demonstrated fluency in written and spoken English and Myanmar language. Proficiency with Microsoft Office (Word, Excel, PowerPoint, Outlook) Excellent interpersonal skills and to work in a team-oriented multi-cultural environment. Demonstrated ability to multi-task as needed, consistently meet deadlines and manage time well Demonstrated professional level of attention to detail and accuracy of work. Ability to work independently, with initiative and minimal supervision. Ability to travel. Preferred Qualifications: Skilled in programming in Stata and in managing household databases. Excellent econometric skills on cross-section and panel data analysis. Experience with data entry and CAPI software packages. Proficiency in Shan, Karen, Kachin, Chin, and/or Mon language. Physical Demand & Work environment: Employee will seat in an upright position for a long period of time. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activity such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading.




ar

Senior Research Coordinator I

Job Summary: The International Food Policy Research Institute (IFPRI) seeks a qualified candidate to fill the position of Senior Research Coordinator for a 2-year, exempt appointment. This position will be based at IFPRI’s office in Lilongwe, Malawi. The Senior Research Coordinator will play a leading role in developing and implementing policy research and engagement strategies, as well as capacity strengthening. Essential Duties: Specific duties and responsibilities include but are not limited to: Policy engagement/influence and capacity strengthening ·          Lead efforts of IFPRI to promote evidence-based policy planning and implementation in Malawi, including the promotion of policy dialogue and mutual learning. ·          Engage with other relevant continental and regional processes to seek opportunities for influencing and strengthening policy processes in Malawi. ·          Strengthen leadership and develop policymaking capacity in Malawi. ·          Develop and strengthen links between IFPRI and Malawi’s relevant Ministries, Departments and Agencies (MDAs). ·          Represent IFPRI in regional meetings and interactions. ·          Develop new partnerships with strategic partners, as and when appropriate. ·          Engage at international level with relevant platforms and processes.   Research development, facilitation and management ·          Develop, implement and manage programs of research at IFPRI in Malawi. ·          Liaise with IFPRI partner organizations to ensure the policy workstream is responsive and complementary to other work streams. ·          Identify funding opportunities for proposals for policy-relevant research. ·          Develop new policy-relevant research to address knowledge gaps/research needs that exist, or emerge. ·          Link with platforms and initiatives to harmonize and strengthen research plans and outputs. ·          Link to and collaborate with (as appropriate) other external partners and stakeholders. ·          Support the dissemination and publication of research results in policy briefs and other targeted publications. ·          Support the Malawi Country Program Leader in internal and external (including donor) reporting and proposal development.   Required Qualifications: ·          PhD plus 5 years’ experience in public policy, economics, political science or quantitative social science. Strong track record of policy research and engagement, and a strong understanding of development policies and practice. Specific experience in Malawi is an advantage. ·          Experience in cross-sectoral policy engagement on agricultural commercialization, urbanization and rural transformation.   ·          Demonstrated leadership and experience in effective interactions in a multicultural and international development setting with other researchers and with policymakers, donors, and civil society in Africa, and preferably in Malawi, facilitating impact of research and capacity strengthening. Experience with CGIAR institutions is desirable. ·          Experience with development of capacity strengthening strategies and programs in Africa, and preferably in Malawi. ·          Major external recognition within peer professional network ·          Willingness to travel extensively as required ·          Excellent written and spoken English communication skills with demonstrated excellence in written and oral presentations. Knowledge of Chichewa is an advantage. ·          Demonstrated leadership skills and strong experience in working in and influencing development institutions. ·          Demonstrated ability to critically assess own and others’ research Physical Demand & Work environment: ·          Employee will sit in an upright position for a long period of time with little opportunity to move/stretch ·          Employee will lift between 0-10pounds ·          Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading   Salary Range : The expected salary range for this job requisition is between $115,800 - $144,800. In determining your salary, we will consider your experience and other job-related factors. Benefits : IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing a strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits  can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US-based employees who work at least 25 hours per week. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity.




ar

Share your experiences to create some SpotOn social media tips for scientists!

It ain’t a party if you can’t join us Towards the end of April, SpotOn




ar

SpotOn London 2013: How are online tools changing science education?

The place we’re in as a society is a crowded field of scattered tools and




ar

Against the grain: Could farmers feed the world and heal the planet?




ar

Policy Seminar | Debt Distress and the Right to Food in Africa




ar

2024 Martin J. Forman Lecture | Supporting and shaping the global nutrition agenda with evidence




ar

2024 Martin J. Forman Lecture | Supporting and shaping the global nutrition agenda with evidence




ar

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.

Dive into six things that are top of mind for the week ending Oct. 25.

1 - CSA: How to prevent “shadow AI” 

As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”

So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.

The white paper covers shadow AI topics including:

  • Creating a comprehensive inventory of AI systems
  • Conducting gap analyses to spot discrepancies between approved and actual AI usage
  • Implementing ways to detect unauthorized AI wares
  • Establishing effective access controls
  • Deploying monitoring techniques

 

 

“By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.

For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:

  • The asset’s description
  • Information about its AI models
  • Information about its data sets and data sources
  • Information about the tools used for its development and deployment
  • Detailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standards
  • Records of its access control mechanisms

Shadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.

To get more details, read:

For more information about AI security issues, including shadow AI, check out these Tenable blogs:

2 - Best practices for secure software updates

The security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.

To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.

“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.

Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally.

 

 

The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.

“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.

To get more details, read:

For more information about secure software updates:

3 - Report: GenAI, attack variety, data security drive cyber strategies

What issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.

That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. 

These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.

“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.

Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.

Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.

Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.

“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.

To get more details, read:

For more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:

4 - CISA lists software dev practices most harmful for security

Recommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.

Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.

“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.

“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added.

 

 

Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:

  • Using programming languages considered “memory unsafe”
  • Including user-provided input in SQL query strings
  • Releasing a product with default passwords
  • Releasing a product with known and exploited vulnerabilities
  • Not using multi-factor authentication
  • Failing to disclose vulnerabilities in a timely manner

Although the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.

If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.

To get more details, check out:

For more information about how to develop secure software:

5 - New EU law focuses on cybersecurity of connected digital products

Makers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.

A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars.

 

 

For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:

  • Aren’t shipped with known exploitable vulnerabilities
  • Feature a “secure by default” configuration
  • Can fix their vulnerabilities via automatic software updates
  • Offer access protection via control mechanisms, such as authentication and identity management
  • Protect the data they store, transmit and process using, for example, at-rest and in-transit encryption

“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.

The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.

For more information and analysis about the EU’s Cyber Resilience Act:

VIDEO

The EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 

6 - UK cyber agency: CISOs must communicate better with boards

CISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.

For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.

“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.

As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.

“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.

Here’s a small sampling of the advice:

  • Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.
  • Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.
  • Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.
  • Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.
  • Aim to provide a holistic view, and avoid using technical jargon.
  • Aim to advise instead of to educate.




ar

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




ar

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.

Dive into six things that are top of mind for the week ending Nov. 8.

1 - CISA: Beware of nasty spear-phishing campaign

Proactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.

Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.

“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads.
 


Other CISA recommendations include:

  • Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFA
  • Educate users on how to spot suspicious emails
  • Hunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and procedures

Although CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.

To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.

For more information about securing RDP tools:

2 - OWASP issues AI security resources

How should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?

These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project

The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.



These are the new resources:

  • The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:
    • preparation
    • detection and analysis
    • containment eradication and recovery
    • post-incident activity
  • The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:
    • Generative AI security policies
    • Risk assessment and management processes
    • Training and awareness
    • Research and development
  • The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.

To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”

For more information about protecting your organization against deepfakes:

3 - Fake update variants dominate list of top malware in Q3

Hackers are doubling down on fake software-update attacks.

That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.

Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.


(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)

In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.

Here’s the full list, in descending order:

  • SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates 
  • LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updates
  • ClearFake, another JavaScript downloader used for fake browser-update attacks
  • ZPHP, another JavaScript downloader used for fake software-update attacks
  • Agent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshots
  • CoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)
  • Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functions
  • Mirai, a malware botnet that compromises IoT devices to launch DDoS attacks
  • NanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheet
  • Lumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking information

To get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.

For details on fake update attacks:


VIDEO

Fake Chrome Update Malware (The PC Security Channel)

4 - CISA’s first international plan unveiled

CISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.

Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.

The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:

  • Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructure
  • Boost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreats
  • Unify the coordination of international activities to strengthen cyberdefenses collectively

The plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.

5 - Interpol hits phishers, ransomware gangs, info stealers

Interpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.

The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.


“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.

In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.

For more information about global cybercrime trends:

6 - IST: Ransomware attacks surged in 2023

Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).

The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. 

“Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.

Global Ransomware Incidents in 2023

Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. 

The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.

The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.

To learn more about ransomware trends:




ar

Social Media for Science Outreach – A Case Study: Career changing and pseudonyms

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




ar

Social Media for Science Outreach – A Case Study: Marine Science & Conservation Outreach

A twitter TeachIn about marine protected areas, hosted by @RJ_Dunlap on 4/8/2013




ar

Social Media for Science Outreach – A Case Study: AntarcticGlaciers.org

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




ar

Social Media for Science Outreach – A Case Study: Chemicals Are Your Friends

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




ar

OSC publishes gamification research and launches new trading simulation tool for Investor Education Month

TORONTO – The Ontario Securities Commission (OSC) today released a new report that studied the impact of gamification on investors.




ar

OSC releases 2024 Investment Fund Survey Data Dashboard

TORONTO - The Ontario Securities Commission (OSC) is pleased to announce the release of the 2024 Investment Fund Survey (IFS) data dashboard.




ar

Capital Markets Tribunal seeks applications for the Securities Proceedings Advisory Committee

TORONTO – The Capital Markets Tribunal is seeking applications for membership to the Securities Proceedings Advisory Committee (SPAC).




ar

OSC announces $150,000 award to international whistleblower

TORONTO – The Ontario Securities Commission (OSC) has issued an award of nearly $150,000 to an international whistleblower who provided information about significant issues at an early-stage firm.




ar

Canadian securities regulators announce results of 10th annual review of representation of women on boards and in executive officer positions in Canada

TORONTO – Participating Canadian securities regulators today published the results of their 10th consecutive annual review of disclosures relating to women on boards and in executive officer positions, as well as the underlying data that was used to prepare the report.




ar

OSC study finds ESG ratings greatly influence investor decisions but are difficult to understand

TORONTO – The Ontario Securities Commission (OSC) today released the results of a study examining the influence of environmental, social and governance (ESG) factors on retail investor decision making.




ar

Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements

TORONTO – The Canadian Securities Administrators (CSA) today published




ar

OSC publishes Summary Report for Investment Fund and Structured Product Issuers

TORONTO – The Ontario Securities Commission has today published its




ar

SpotOn London 2012 Storify: Fixing the fraud: how do we safeguard science from misconduct?

#solo12fraud




ar

SpotOn London 2012: My not-so-secret-anymore double life: Juggling research and science communication

Dr Anne Osterrieder is a Research and Science Communication Fellow in Plant Cell Biology at the Department of