v Tenable Research Uncovers Thousands of Vulnerable Cyber Assets Amongst Southeast Asia’s Financial Sector By www.tenable.com Published On :: Thu, 29 Aug 2024 09:09:05 -0400 New research conducted by Tenable®, Inc., the exposure management company, has uncovered more than 26,500 potential internet-facing assets among Southeast Asia’s top banking, financial services and insurance (BFSI) companies by market capitalisation across Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam.On July 15, 2024, Tenable examined the external attack surface of over 90 BFSI organisations with the largest market capitalisations across the region. The findings revealed that the average organisation possesses nearly 300 internet-facing assets susceptible to potential exploitation, resulting in a total of more than 26,500 assets across the study group.Singapore ranked the highest among the six countries assessed, with over 11,000 internet-facing assets identified across its top 16 BFSI companies. Over 6,000 of those assets are hosted in the United States. Next on the list is Thailand with over 5000 assets. The distribution of internet-accessible assets underscores the need for cybersecurity strategies that adapt to the rapidly evolving digital landscape.CountryNumber of internet-facing assets amongst top 90 BFSI companies by market capitalisationSingapore11,000Thailand5,000Indonesia4,600Malaysia4,200Vietnam3,600Philippines2,600“The results of our study reveal that many financial institutions are struggling to close the priority security gaps that put them at risk. Effective exposure management is key to closing these gaps,” said Nigel Ng, Senior Vice President, Tenable APJ. “By identifying and securing vulnerable assets before they can be exploited, organisations can better protect themselves against the growing tide of cyberattacks.” Cyber Hygiene Gaps The Tenable study revealed many potential vulnerabilities and exposed several cyber hygiene issues among the study group, including outdated software, weak encryption, and misconfigurations. These vulnerabilities provide cybercriminals with easily exploitable potential entry points, posing potential risk to the integrity and security of financial data. Weak SSL/TLS encryption A notable finding is that among the total assets, organisations had nearly 2,500 still supporting TLS 1.0—a 25-year old security protocol introduced in 1999 and disabled by Microsoft in September 2022. This highlights the significant challenge organisations with extensive internet footprints face in identifying and updating outdated technologies.Misconfiguration increases external exposureAnother concerning discovery was that over 4,000 assets, originally intended for internal use, were inadvertently exposed and are now accessible externally. Failing to secure these internal assets poses a significant risk to organisations, as it creates an opportunity for malicious actors to target sensitive information and critical systems.Lack of encryption There were over 900 assets with unencrypted final URLs, which can present a security weakness. When URLs are unencrypted, the data transmitted between the user's browser and the server is not protected by encryption, making it vulnerable to interception, eavesdropping, and manipulation by malicious actors. This lack of encryption can lead to the exposure of sensitive information, such as login credentials, personal data, or payment details, and can compromise the integrity of the communication.API vulnerabilities amplify riskThe identification of over 2,000 API v3 out of the total number of assets among organisations' digital infrastructure poses a substantial risk to their security and operational integrity.APIs serve as crucial connectors between software applications, facilitating seamless data exchange. However, inadequate authentication, insufficient input validation, weak access controls, and vulnerabilities in dependencies within API v3 implementations create a vulnerable attack surface.Malicious actors can exploit such weaknesses to gain unauthorised access, compromise data integrity, and launch devastating cyber attacks.“The cybersecurity landscape is evolving faster than ever, and financial institutions must evolve with it, so they can know where they are exposed and take action to close critical risk” Ng added. “By prioritising exposure management, these organisations can better protect their digital assets, safeguard customer trust, and ensure the resilience of their operations in an increasingly hostile digital environment.”About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. Notes to Editors:Tenable examined the top 12-16 BFSI companies discoverable based on market cap. In the context of this alert:An asset is a domain name, subdomain, or IP addresses and/or combination thereof of a device connected to the Internet or internal network. An asset may include, but not limited to web servers, name servers, IoT devices, network printers, etc. Example: foo.tld, bar.foo.tld, x.x.x.xs.The Attack Surface is from the network perspective of an adversary, the complete asset inventory of an organisation including all actively listening services (open ports) on each asset. Full Article
v Tenable Introduces AI Aware: A Groundbreaking Proactive Security Solution for AI and Large Language Models By www.tenable.com Published On :: Tue, 10 Sep 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced the release of AI Aware, advanced detection capabilities designed to rapidly surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management, the world’s #1 vulnerability management solution. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins so organizations can confidently expose and close AI risk, without inhibiting business operations.The rapid development and adoption of AI technologies in the past two years has introduced major cybersecurity and compliance risks that organizations must proactively address without established best practices. As a result, cybersecurity teams face significant AI-related challenges, such as vulnerability detection and remediation, containing data leakage and reining in unauthorized AI use. According to recent Tenable Research, more than one-third of security teams are finding usage of AI applications in their environment that might not have been provisioned via formal processes. In fact, during a 75-day period between late June and early September, Tenable found over 9 million instances of AI applications on more than 1 million hosts. The cybersecurity risk of unfettered AI usage is compounded by the increasing volume of AI vulnerabilities. Tenable Research has found and disclosed several vulnerabilities in AI solutions, including in Microsoft Copilot, Flowise, Langflow, among others.With AI Aware, Tenable transforms proactive security for AI solutions. Tenable AI Aware uniquely leverages agents, passive network monitoring, dynamic application security testing and distributed scan engines to detect approved and unapproved AI software, libraries and browser plugins, along with associated vulnerabilities, thereby mitigating risks of exploitation, data leakage and unauthorized resource consumption. The combined depth of these multiple assessment methods delivers the most complete detection of AI in the modern ecosystem. [Watch the Tenable AI Aware product demo video here.]“In an effort to keep pace with the sea change introduced by AI, organizations around the world ran full speed ahead, potentially bypassing countless cybersecurity, privacy and compliance red flags,” said Shai Morag, chief product officer, Tenable. “Perhaps more so than with any other new technology we’ve seen, there are many risk factors to consider, especially with rushed development and deployment. Tenable AI Aware empowers organizations to deploy AI confidently, ensuring their security measures keep pace with the rapid evolution of AI technologies.”In addition to AI software and vulnerability detection, key AI Aware features available in Tenable Vulnerability Management, Tenable Security Center and Tenable One include:Dashboard Views provide a snapshot of the most common AI software discovered in the ecosystem, top assets with vulnerabilities related to AI and the most common communication ports leveraged by AI technologies. Shadow Software Development Detection illuminates the unexpected existence of the building blocks of AI development in the environment, enabling businesses to align initiatives with organizational best practices.Filter Findings for AI Detections enable teams to focus on AI-related findings when reviewing vulnerability assessment results. Combined with the power of Tenable Vulnerability Prioritization Rating (VPR), teams can effectively assess and prioritize vulnerabilities introduced by AI packages and libraries. Asset-Centric AI-Inventory provides a complete inventory of AI-related packages, libraries and browser plugins while reviewing the detailed profile of an asset. Join the upcoming Tenable webinar titled, "Mitigating AI-Related Security Risks: Insights and Strategies with Tenable AI Aware" on October 9, 2024 at 11:00 am ET, by registering here.More information on Tenable AI Aware is available at: https://www.tenable.com/products/vulnerability-management/ai-aware About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
v Tenable Launches Tenable Enclave Security to Meet Demands of Highly Secure Environments By www.tenable.com Published On :: Wed, 18 Sep 2024 06:00:00 -0400 Tenable®, the exposure management company, today announced the availability of Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security protects IT assets and modern workloads with risk assessment and contextual insight so organizations can identify exposures before they cause damage.Federal agencies face unique security and compliance regulations when deploying cloud solutions, and Tenable Enclave Security is key to supporting public sector customers, as well as commercial organizations with strict data residency, security or privacy requirements. Built to support the strictest security requirements, including FedRAMP High and Impact Level 5, Tenable Enclave Security empowers agencies to know, expose and close IT and container exposures from a single, highly secure platform. This consolidated approach also eliminates tool sprawl, reduces costs and boosts efficiency for public sector organizations.“As a leader in vulnerability management and cloud security and a longtime partner of governments all around the world, we’re perfectly positioned to tap into our expertise and deliver mission critical capabilities to assist government agencies as they transform their IT strategy and safely embrace modern workloads to speed innovation,” said Robert Huber, chief security officer and president, Tenable Public Sector, Tenable. “With Tenable Enclave Security, agencies are now able to gain a fuller understanding of their exposure and risk with the ability to continuously discover, assess and prioritize vulnerabilities across IT assets and container images, all from a single, highly secure framework.”Tenable Enclave Security will immediately enable organizations to: Meet cloud security and data residency restrictions: Tenable Enclave Security enables customers to meet stringent cloud security and data residency requirements, such as FedRAMP High or Impact Level 5. It can meet customers’ needs wherever they reside, with the ability to be deployed on-prem, in a virtual private cloud or commercial cloud.Secure containers before they hit production: As agencies modernize their infrastructure, containers create a more efficient manner to create applications and modernize existing ones. Tenable Enclave Security empowers organizations to quickly assess the risk in their container images, expose their vulnerabilities and understand the breadth of impact.Centralize security tools: Unlike siloed solutions with fragmented visibility, Tenable Enclave Security provides protection for IT assets and modern workloads from a single deployment architecture. For more information on Tenable Enclave Security, please visit: https://www.tenable.com/products/enclave-security About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
v Tenable Selected by Bank of Yokohama to Secure its Active Directory and Eliminate Attack Paths By www.tenable.com Published On :: Fri, 20 Sep 2024 09:00:47 -0400 Tenable®, Inc. the exposure management company, today announced that Bank of Yokohama, one of the largest of the major regional banks in Japan, has chosen Tenable Identity Exposure to protect its Active Directory and enhance the bank’s ability to protect its internal systems from cyber threats.Bank of Yokohama, based in Kanagawa Prefecture and Tokyo Metropolitan, is committed to enhancing industry security standards. In 2023, it collaborated with 19 other regional banks to establish CMS-CSIRT, an organization providing mutual cybersecurity support. Unlike megabanks, regional banks often face resource and budget constraints, making such collaborative efforts crucial for implementing effective security programs.As part of its objectives for FY 2023, the Bank of Yokohama wanted to improve Active Directory (AD) security as it’s the most crucial system in the bank’s intranet. Previously, the bank only applied security patches periodically without any tool or system to detect Active Directory misconfigurations or attacks. Given the evolving threat landscape and rise of attacks involving an identity breach, enhancing the security of Active Directory became a top priority.“Attackers who have infiltrated an organization's internal system or who wield ransomware and other malware, almost always make a beeline for Active Directory,” said Mr. Akihiro Fushimi, Leader, Concordia Financial Group ICT Governance Department, Security Governance Section and Bank of Yokohama ICT Planning & Promotion Department, Security Governance Section. “They steal user account privileges and elevate them via Active Directory, to enable them to access important data. So, securing Active Directory was an area that we wanted to invest in.”Bank of Yokohama already used Tenable Security Center for vulnerability management and trusted Tenable's reliability. Selecting Tenable Identity Exposure was an easy decision, with its fast, agentless feature ensuring a seamless deployment process.The deployment of Tenable Identity Exposure provided the Bank of Yokohama with an in-depth view of its Active Directory. The bank can now accurately identify every AD account, including dormant accounts and machine identities, and understand the potential risks of exploitation by malicious actors due to the multi-functional capabilities of Active Directory. Tenable Identity Exposure detects many of the techniques used in cyber attacks to gain elevated privileges and enable lateral movement, including DCShadow, Brute Force, Password Spraying, Golden Ticket and more.“Previously, we were under the impression that all we needed to do was to apply patches and manage accounts. Now, with the deployment of Tenable Identity Exposure, we are physically able to see the risk of exploitation. This, I believe, is the positive impact of deploying Tenable Identity Exposure. Its alert functions are comprehensive—it detects vulnerabilities as well as misconfigurations,” said Mr. Shinnosuke Shimada, Bank of Yokohama ICT Planning & Promotion Department, Security, Governance Section.“Many organizations struggle to maintain proper Active Directory security as their domains grow more complex, often leaving flaws undetected until a major incident occurs. Given the high-profile attacks involving AD in recent years, it's crucial to prioritize AD security within the overall cybersecurity strategy,” said Naoya Kishima, Country Manager, Tenable Japan. “Bank of Yokohama recognizes this need, and we're pleased to support them in their security journey.”About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. Media contactTenable PRtenablepr@tenable.com Full Article
v Leading Analyst Firm Ranks Tenable #1 for Sixth Consecutive Year in Market Share for Device Vulnerability Management By www.tenable.com Published On :: Thu, 10 Oct 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced that it has been ranked first for 2023 worldwide market share for device vulnerability management in the IDC Worldwide Device Vulnerability Management Market Shares (doc #US51417424, July 2024) report. This is the sixth consecutive year Tenable has been ranked first for market share.According to the IDC market share report, Tenable is ranked first in global 2023 market share and revenue. Tenable credits its success to its strategic approach to risk management, which includes a suite of industry-leading exposure management solutions that expose and close security gaps, safeguarding business value, reputation and trust. The Tenable One Exposure Management Platform, the world’s only AI-powered exposure management platform, radically unifies security visibility, insight and action across the modern attack surface – IT, cloud, OT and IoT, web apps and identity systems.According to the IDC market share report, “The top 3 device vulnerability management vendors remained the same in 2023 as previous years, with Tenable once again being the top vendor.”The report highlighted Tenable’s use of generative AI, noting, “ExposureAI, available as part of the Tenable One platform, provides GenAI-based capabilities that include natural language search queries, attack path and asset exposure summaries, mitigation guidance suggestions, and a bot assistant to ask specific questions about attack path results.”Tenable’s latest innovations in the vulnerability management market – Vulnerability Intelligence and Exposure Response – were also highlighted in the report, stating, “Vulnerability Intelligence provides dynamic vulnerability information collected from multiple data sources and vetted by Tenable researchers, while Exposure Response enables security teams to create campaigns based on risk posture trends so remediation progress can be monitored internally.”The report also spotlighted the Tenable Assure Partner Program and MDR partnerships, noting, “Tenable has made more of a strategic effort to recruit managed security service providers (SPs) and improve the onboarding experience for them, as well as their customers. Managed detection and response (MDR) providers have been adding proactive exposure management because it helps shrink the customer attack surface, helping them provide better outcomes. Sophos and Coalfire are recently announced partners adding managed exposure management services to their MDR and pen testing services, respectively.”“At Tenable, we build products for a cloud-first, platform centric world, meeting customers' evolving risk management needs,” said Shai Morag, chief product officer, Tenable. “We leverage cutting edge technology, innovating across our portfolio to help customers know, expose and close priority security gaps that put businesses at risk.” "The device vulnerability management market is characterized by a focus on broader exposure management, with a number of acquisitions to round out exposure management portfolios," said Michelle Abraham, senior research director, Security and Trust at IDC. "Vendors are advised to enhance their offerings with additional security signals and automated remediation workflows to stay competitive in this evolving landscape."To read an excerpt of the IDC market share report, visit https://www.tenable.com/analyst-research/idc-worldwide-device-vulnerability-management-market-share-report-2023 About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
v Tenable Tackles Emerging Cloud and AI Risks With the Launch of Data and AI Security Posture Management for Cloud Environments By www.tenable.com Published On :: Tue, 15 Oct 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. By extending exposure management capabilities to cloud data and AI resources, Tenable Cloud Security reduces risk to two of the biggest emerging threats.Today’s cloud environments are more complex than ever. The challenge of managing this complexity has led to preventable security gaps caused by misconfigurations, risky entitlements and vulnerabilities, leaving sensitive data and AI resources vulnerable. In fact, Tenable Research found that 38% of organizations are battling a toxic cloud trilogy – cloud workloads that are publicly exposed, critically vulnerable and highly privileged. Tenable Cloud Security exposes risk from across hybrid and multi-cloud environments, including vulnerabilities, misconfigurations and excess privilege, that affects data and AI resources. Integrating DSPM and AI-SPM into Tenable Cloud Security enables users to automatically discover, classify and analyze sensitive data risk with flexible, agentless scanning. With Tenable Cloud Security’s intuitive user interface, security leaders can easily answer tough questions – such as “What type of data do I have in the cloud and where is it located?,” “What AI resources are vulnerable and how do I remediate the issue?” and “Who has access to my sensitive cloud and AI data?”“Data is constantly on the move and new uses for data in today’s AI-driven world have created new risks,” said Liat Hayun, vice president of product management for Tenable Cloud Security. “DSPM and AI-SPM capabilities from Tenable Cloud Security bring context into complex risk relationships, so teams can prioritize threats based on the data involved. This gives customers the confidence to unlock the full potential of their data without compromising security.”“The importance of cloud data has made communicating data exposure risk one of the biggest security challenges for CISOs,” said Philip Bues, senior research manager, Cloud Security at IDC. “Tenable is at the forefront of this emerging DSPM-CNAPP conversation, enabling customers to contextualize and prioritize data risk and communicate it, which is pertinent to almost every domain in CNAPP.”AI-SPM features enable customers to confidently forge ahead with AI adoption by enforcing AI and machine learning configuration best practices and securing training data. With the combined power of AI-SPM and Tenable Cloud Security’s market-leading cloud infrastructure entitlement management (CIEM) and Cloud Workload Protection (CWP) capabilities, customers can manage AI entitlements, reduce exposure risk of AI resources, and safeguard critical AI and machine learning training data to ensure data integrity. Available to all Tenable Cloud Security and Tenable One customers, these new features enable customers to:Gain complete visibility and understanding of cloud and AI data - Tenable Cloud Security continuously monitors multi-cloud environments to discover and classify data types, assign sensitivity levels and prioritize data risk findings in the context of the entire cloud attack surface. Effectively prioritize and remediate cloud risk - Backed by vulnerability intelligence from Tenable Research, context-driven analytics provides security teams with prioritized and actionable remediation guidance to remediate the most threatening cloud exposures.Proactively identify cloud and AI data exposure - Unique identity and access insights enable security teams to reduce data exposure in multi-cloud environments and AI resources by monitoring how data is being accessed and used and detect anomalous activity. Join the upcoming Tenable webinar, “Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” on October 22, 2024 at 10 am BST and 11 am ET, by registering here. Read today’s blog post, “Harden your cloud security posture by protecting your cloud data and AI resources” here. With a Net Promoter Score of 73, Tenable Cloud Security helps customers around the world expose and close priority threats. More information about DSPM and AI-SPM capabilities available in Tenable Cloud Security is available at: https://www.tenable.com/announcements/dspm-ai-spmAbout TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
v Mountain time / Ivan Doig. By library.gcpl.lib.oh.us Published On :: Often hailed as the heir apparent to Wallace Stegner, Ivan Doig is among the finest chroniclers of the contemporary American West. In Mountain Time, Lexa McCaskell and Mitch Rozier leave their Seattle home to visit Mitch's dying father in Montana. There Mitch clashes with both Lexa and his father as events from the past are explored and difficult memories resurface. "Mountain Time will not dissuade those who rank Doig among the best living American writers."-San Francisco Chronicle Full Article
v Mouvar's magic [dramatized adaptation] / Piers Anthony and Robert E. Margroff. By library.gcpl.lib.oh.us Published On :: The mysterious prophecy that has shaped the life of Kelvin Knight Hackleberry and his family seems nearly to have run its course. The Two Kingdoms that were joined by Kelvin to form Kelvinia have now been united with three others, to make a great confederation under the rule of the young twin kings, Kildom and Kildee. Kelvin has earned some time to rest with his family. Charles and Merlain are now twenty years old, and so is Dragon Horace, their brother who is the Great King of all the land. But the clouds of the last battle are gathering. The evil Professor DeVale and his witch servant Zady had been foiled in their attempt to destroy Kelvin by using his children--their evil plot has led to a stronger, more peaceful land under its rightful rulers. Now they will try one last time to pervert all that is good in the universe of the frames--and although the Prophecy of Mouvar has been accurate up to now, still there is a chance that evil will prevail. Full Article
v Moving forward sideways like a crab / Shani Mootoo. By library.gcpl.lib.oh.us Published On :: A young man travels to Trinidad to reconnect with a transgender parent, uncovering the complex realities of love and family. Jonathan Lewis-Adey was nine when his parents separated, and his mother, Sid, vanished entirely from his life. It is not until he is a grown man that Jonathan finally reconnects with his beloved lost parent, only to find, to his shock and dismay, that the woman he knew as "Sid" in Toronto has become an elegant man named Sydney living in his native Trinidad. For nine years, Jonathan has paid regular visits to Sydney on his island retreat, trying with quiet desperation to rediscover the parent he adored inside this familiar stranger, and to overcome his lingering confusion and anger at the choices Sydney has made. At the novel's opening, Jonathan is summoned urgently to Trinidad where Sydney, now aged and dying, seems at last to offer him the gift he longs for: a winding story that moves forward sideways as it reveals the truths of Sydney's life. But when and where the story will end is up to Jonathan, and it is he who must decide what to do with Sydney's haunting legacy of love, loss, and acceptance. Full Article
v Moving on. Dump Your Relationship Baggage and Make Room for the Love of Your Life / Russell Friedman and John W. James. By library.gcpl.lib.oh.us Published On :: In this groundbreaking book, authors Russell Friedman and John W. James show listeners how to move on from their unsuccessful past relationships and finally find the love of their lives. Demonstrating revolutionary ideas that have worked for thousands of their clients at the Grief Recovery Institute, Friedman and James give listeners the strategies they need to effectively mourn the loss of the relationship, while opening themselves up to love in the future. With compassionate guidance, Friedman and James help listeners to close a chapter of their romantic past so that they can be ready to begin again. Full Article
v Moving on [dramatized adaptation] / Jane Candia Coleman. By library.gcpl.lib.oh.us Published On :: Western Jane Candia Coleman is a natural storyteller whose characters come from the lands between the southwestern valleys of Arizona and the Gila Mountains of New Mexico. The night Billy the Kid died is hauntingly depicted in Corrido for Billy. Lady Flo is a memoir, based on historical fact, of the black wife of an Irish nobleman. Moving On depicts a young girl abandoned by her family who finds her way with an itinerant Jewish peddler. And Are You Coming Back, Phin Montana? is the winner of the 1995 Spur Award for Best Western Short Fiction. Each story embodies the finest elements of Western fiction imitations of hope, vulnerability, and courage. Full Article
v Moving through grief : proven techniques for finding your way after any loss / Gretchen Kubacky, PsyD. By library.gcpl.lib.oh.us Published On :: Overcoming your pain-proven strategies for grief recovery Coping with loss is difficult, but that doesn't mean you have to suffer alone. Based on the proven-effective acceptance and commitment therapy (ACT) treatment, Moving Through Grief provides simple and effective techniques to help you get unstuck and start living a rich and fulfilling life again, loss and all. ACT is all about embracing what hurts and committing to actions that will improve and enrich your life. Whether you're dealing with the loss of a loved one, your health, home, or even career, Moving Through Grief provides you with creative exercises that will help you work through your pain and reconnect with the things you love. In Moving Through Grief, you will learn: - How you can show up for your life and experience joy and satisfaction again, even as you work through the pain of your loss -Ddiscover how the six tools of ACT-values, committed action, acceptance, being present, cognitive diffusion, and self-as-context-can ease your pain and aid with the healing process - And make real progress towards feeling like yourself again with straightforward exercises, like identifying your values and setting realistic goals. Find out how ACT can change the way you relate to your pain with Moving Through Grief. Full Article
v Mr. bridge / Evan S. Connell. By library.gcpl.lib.oh.us Published On :: A lawyer with a growing stockpile of securities in the bank, three beautiful children, a compliant and decorative wife, and a lovely house in the suburbs, Walter Bridge has achieved all that is expected of someone of his race and background. But try as he might to control the lives of those around him, they prove perversely independent. In Mr. Bridge and its companion, Mrs. Bridge, Evan S. Connell has brilliantly realized the lives of upper-middle-class Americans living in the years just before and during World War II. Full Article
v Mr. Lincoln's T-mails : the untold story of how Abraham Lincoln used the telegraph to win the Civil War / Tom Wheeler. By library.gcpl.lib.oh.us Published On :: The Civil War was the first "modern war." Because of the rapid changes in American society, Abraham Lincoln became president of a divided United States during a period of technological and social revolution. Among the many modern marvels that gave the North an advantage was the telegraph, which Lincoln used to stay connected to the forces in the field in almost real time. No leader in history had ever possessed such a powerful tool to gain control over a fractious situation. An eager student of technology, Lincoln had to learn to use the power of electronic messages. Without precedent to guide him, Lincoln began by reading the telegraph traffic among his generals. Then he used the telegraph to supplement his preferred form of communication-meetings and letters. He did not replace those face-to-face interactions. Through this experience, Lincoln crafted the best way to guide, reprimand, praise, reward, and encourage his commanders in the field. By paying close attention to Lincoln's "lightning messages," we see a great leader adapt to a new medium. No listener of this work of history will be able to miss the contemporary parallels. Watching Lincoln carefully word his messages-and follow up on those words with the right actions-offers a striking example for those who spend their days tapping out notes on computers and BlackBerrys. Full Article
v Mr. palomar / Italo Calvino. By library.gcpl.lib.oh.us Published On :: Mr. Palomar, whose name purposely evokes that of the famous telescope, is a seeker after knowledge, a visionary in a world sublime and ridiculous. Whether contemplating a cheese, a woman's breasts, or a gorilla's behavior, he brings us a vision of a world familiar by consensus, fragmented by the burden of individual perception. Translated by William Weaver. A Helen and Kurt Wolff Book Full Article
v La National Gallery presenta «Van Gogh: Poetas y amantes» By theartwolf.com Published On :: Tue, 10 Sep 2024 07:02:01 +0000 La National Gallery presenta «Van Gogh: Poetas y amantes» Con motivo de su 200 aniversario,... Full Article
v El Museo Van Gogh celebra 150 años de Impresionismo en «¡Vive l’impressionnisme!» By theartwolf.com Published On :: Tue, 08 Oct 2024 07:02:01 +0000 El Museo Van Gogh celebra 150 años de Impresionismo en «¡Vive l’impressionnisme!» Del 11 de... Full Article
v El Louvre pone el foco en el enigmático “Pierrot” de Watteau By theartwolf.com Published On :: Sun, 20 Oct 2024 07:02:01 +0000 El Louvre pone el foco en el enigmático “Pierrot” de Watteau Del 16 de octubre... Full Article
v El MFAH es la sede exclusiva en EE.UU. de «El mundo de Gauguin» By theartwolf.com Published On :: Sun, 03 Nov 2024 07:02:01 +0000 El MFAH es la sede exclusiva en EE.UU. de «El mundo de Gauguin» Del 3... Full Article
v ContiLeaks Vulnerabilities By www.tenable.com Published On :: Thu, 24 Mar 2022 07:00:00 -0400 A security researcher posted private chat messages between members of the Conti ransomware group, providing valuable insight into which vulnerabilities are leveraged by the group and affiliates in their cyber attacks. The Conti ransomware group has earned a reported $180 million in profits by leasing their Ransomware-as-a-Service (RaaS) model to cripple cyber-infrastructure in vulnerable organizations. Tenable has published a variety of content to assist customers with identifying the vulnerabilities leveraged by the Conti ransomware group and its affiliates. Conti and their affiliates have had a particularly devastating impact on healthcare services, including at least 16 U.S. health and emergency networks. Conti attacked Ireland’s Health Service Executive (HSE), demanding a $20 million dollar ransom, which the HSE refused to pay, opting instead to shut down IT services for mitigation efforts. Tenable’s 2021 Threat Landscape Retrospective report revealed that 24.7% of healthcare data breaches were the result of ransomware attacks, and ransomware itself was responsible for 38% of all breaches last year. The leaked data revealed that Conti and its affiliates have been exploiting a number of vulnerabilities. There are also reports that Conti and its affiliates have targeted vulnerabilities in the Fortinet FortiOS found in Fortinet’s SSL VPN devices to gain initial access to target environments. Organizations are often breached from legacy vulnerabilities present in the IT infrastructure of small companies they have recently acquired. The analysis of the ContiLeaks data identifies the vulnerabilities that are being actively exploited, enabling security managers to prioritize mitigation. The Security Response Team (SRT) of Tenable Research has analyzed the ContiLeaks data to ensure customers are fully informed of their vulnerability to Conti RaaS attacks. The SRT also provides breakdowns for the latest vulnerabilities in the Tenable Blog. Tenable Research has released over 165,000 plugins and leads the industry on CVE coverage. Tenable's SRT team continuously works to help organizations prioritize and create remediation plans for the new threats, which often leave very little time for reflection. This report contains the following chapters: Executive Summary Chapter - Contains information from the ContiLeaks Dashboard that uses the CVE and Plugin Family filters to display counts of the vulnerabilities and assets that have been affected by ContiLeaks. Linux Chapter - Contains charts and tables that group together ContiLeaks related CVEs for all Linux Operating Systems and includes an IP Detail for the hosts identified. Windows Chapter - Contains charts and tables that group together ContiLeaks related CVEs for all Windows Operating Systems and includes an IP Detail for the hosts identified. Other Chapter - Contains charts and tables that group together ContiLeaks related CVEs for all "Other" Operating Systems and includes an IP Detail for the hosts identified. Full Article
v Establishing a Software Inventory By www.tenable.com Published On :: Fri, 27 May 2022 09:00:00 -0400 In the event of a security breach, a software inventory is essential to determine what was breached, and who needs to be notified. First responders require a software inventory to perform forensic analysis and determine breach notification requirements for vendors, business partners, and regulatory bodies. Organizations that have a clear understanding of software in their environment can quickly assess a breach impact and identify affected areas. If legal proceedings are involved, an organized software inventory greatly assists in limiting data handed over to Law Enforcement and assists technical staff in depositions or testimony. Business Continuity and Disaster Recovery plans specify requirements for restoration of critical assets and services, but these need to be identified to establish a Recovery Time Objective (the amount of time to recover a service to an acceptable level of operation) and Recovery Point Objective (the last point of known good data.) Developing and maintaining a software inventory is a critical first step in implementing an effective cyber security program. A software inventory helps demonstrate compliance with regulatory controls and Service Level Agreements (SLA) for software used in the environment. From the perspective of “less is more,” a software inventory also identifies unnecessary software running in the environment, which increases the attack surface without providing a business advantage. Security operations perform scans to identify operating system and application versions, including unsupported software and unpatched systems. This information is used to establish a secure baseline and measure drift from that baseline. A software inventory is necessary to determine if the software is authorized, appropriately licensed, supported, and has the most recent security fixes applied. Identifying the authorized software assets is an important step to ensure critical assets are protected. The larger the organization, the more difficult the inventory process becomes. Tenable.io and Tenable.sc help organizations build a software inventory. There are several software discovery plugins that run by default in the following scan templates: Basic and Advanced Agent Scans Advanced (Network) Scan Basic (Network) Scan Credentialed Patch Audit Internal PCI Network Scan Maintaining a software inventory aids in cyber hygiene and minimizes unauthorized software installation. Many organizations perform an annual audit by an external third party, where they are required to enumerate authorized software that is running in the environment. Organizations that maintain a current software inventory throughout the year can produce information required by auditors and vendors with minimal effort. The report and its chapters are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Discovery and Detection. The report requirements are: Tenable.sc 5.19.1 Nessus 10.0.1 Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.io discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. Chapters Executive Summary This chapter presents data for detected operating systems, browsers, unsupported software, and other software installations on systems within a network. Installed Software Iteration This chapter displays software detected across the organizations systems. Software enumeration is utilized to detect Installed software. Issues Gating Remediation This chapter displays known/identified roadblocks to completing remediation efforts. Full Article
v Web Services By www.tenable.com Published On :: Mon, 14 Aug 2023 17:38:10 -0400 Web applications often have the ability to interface with system functions and critical databases to add or modify data. By design, web applications need to enable customers and users access to this data. This capability means that attackers are often able to leverage the same forms or other data entry methods to exploit flaws in web frameworks or other related software to bypass access controls. Web applications exist on remote servers or in cloud environments, and data is transmitted over public networks, presenting a very real and present attack path in the organization’s global attack vector. Web application security is a critical aspect to ensure the confidentiality, integrity, and availability of web applications. This report provides a combined view of data collected using the Tenable Web App Scanner and Tenable Vulnerability Management using Nessus. Organizations need to know what web services are operating in the environment to ensure these web services are analyzed for current known vulnerabilities and attacks. Tenable Security Center along with Tenable Web App Scanning provides a thorough view of risks related to web services. Leveraging both scan methods enables the security operations team and application developers to see risk and threat vectors from application frameworks and vulnerabilities on the host servers themselves. Security and compliance frameworks, such as the Open Web Application Security Project (OWASP) Top 10, provides risk managers insight into methods used by adversaries to exploit common flaws and misconfigurations. Tenable Web App Scanner attributes vulnerabilities using the Cross Reference field to link to all published OWASP versions. Upon completion of the web application scan, the vulnerabilities detected and linked to OWASP 2021 provide an industry best practice approach to mitigating vulnerabilities. The report and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable Security Center Feed under the category Threat Detection & Vulnerability Assessments. The requirements for this report are: Tenable Security Center 6.2.0 Tenable Nessus 10.5.4 Tenable Web Application Scanner Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. Chapters Executive Summary: The chapter provides a high-level view of web related vulnerabilities collected by Tenable Web App Scanner and Tenable Nessus. Through trending and comparative charts, security managers are able to view current and past health of web applications and the associated server assets. SSL Related Vulnerabilities: This chapter provides the development team with information related to SSL, TLS and other encryption related vulnerabilities. The trending charts and tables enables risk migration teams to identify the affected assets and begin the remediation process. Most Critical OWASP 2021 Vulnerabilities: This chapter combines the OWASP 2021 categories along with CVSSv3 categories to identify the top vulnerably that needs to be mitigated first. A series of tables and charts provide the vulnerability details and affected URL assets. Web Application Vulnerabilities by Collection Method: This chapter provides a summarized list of all web application vulnerabilities from both Nessus and Tenable Web App Scanner. A series of tables and trend charts helps security operations teams and risk managers to track progress and focus efforts as needed. Full Article
v Tenable Web App Scanning Overview By www.tenable.com Published On :: Mon, 21 Aug 2023 13:28:02 -0400 The prevalence of web applications makes them a prime target for cyber criminals. Failure to secure web applications can lead to serious financial and reputational consequences. This report provides details of vulnerability data discovered by Tenable Web App Scanning. Tenable Web App Scanning provides comprehensive and accurate vulnerability scanning and risk analysis by leveraging OWASP Top 10 risks to vulnerable web application components. Tenable provides comprehensive and automated vulnerability scanning for modern web applications using Dynamic Application Security Tests (DAST). The security and development teams leverage these detailed vulnerability scans of the application at any point in the development lifecycle and are able understand the true security risks of the web application before deployment. Tenable Security Center uses a comprehensive list of attributes to increase visibility into web application vulnerabilities. Risk managers are able to focus on security challenges that pose the greatest threat and most risk by leveraging Common Vulnerability Scoring System (CVSS) and OWASP references. The report provides a detailed view of the web application components and custom code vulnerabilities. Additionally, vulnerability details related to Log4J are provided, which displays any detected applications that are found to be vulnerable to Log4J exploits. The report and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable Security Center Feed under the category Security Industry Trends. The requirements for this dashboard are: Tenable Security Center 6.2.0 Tenable Web Application Scanner Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. Chapters Executive Summary: The Tenable Web App Scanning Overview report provides details of vulnerability data discovered by Tenable Web App Scanning, beginning with summary dashboard style view for leadership team. Web Application Vulnerability Statistics: This chapter combines the data collected from Nessus and Tenable Web App Scanner, providing a holistic view of vulnerabilities based on scanning the physical asset as well as the web application asset. OWASP 2021 Vulnerability Summary: Security and compliance frameworks, such as the Open Web Application Security Project (OWASP) Top 10, provides risk managers insight into methods used by adversaries to exploit common flaws and misconfigurations. Log4Shell: This chapter provides trending analysis along with vulnerability details related to log4shell vulnerabilities detected by both Nessus and Tenable Web App Scanning. Tenable recommends prioritizing these applications immediately for remediation efforts. Full Article
v WAS Executive Summary By www.tenable.com Published On :: Tue, 22 Aug 2023 14:44:48 -0400 From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more. Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations. Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this report highlights the top most vulnerable web applications and assets at risk for exploitation. This report leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data. The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft. In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this report leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the report enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface. This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are: Tenable.sc 6.2.0 Tenable Web App Scanning Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. Chapters New Web Application Vulnerabilities: This chapter provides a view of web application vulnerabilities which are newly discovered. The elements summarize the first stage of vulnerabilities in the risk life cycle. The Web Application Vulnerabilities by State matrix tracks web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets. New OWASP 2021 Vulnerabilities: This chapter provides a view of OWASP 2021 vulnerabilities which are newly discovered. The OWASP 2021 Categories (Last 14 days) matrix displays web application vulnerabilities identified using the 2021 OWASP categories. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The OWASP 2021 Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the OWASP 2021 Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets. Full Article
v Dear Jeril ... love, Dad / Wayne P. Anderson. By library.gcpl.lib.oh.us Published On :: As a Father's Day gift Wayne Anderson's oldest daughter Jerilyn, often called Jeril, presented him with a fat three-hole notebook containing the letters and stories he had written her from the time she was twenty until she was thirty-eight-from 1977 to 1995. It was one of his dearest Father's Day gifts ever. And it was an especially appropriate gift as she had been an avid reader since childhood and was now a creative librarian who continued to cherish the written word. Anderson was amazed at how much detail there was in the letters about his adventures around the world. He has decided to share the parts of these letters that other travelers, active or armchair, might enjoy in this Venture Bound Book. Full Article
v Dear Juliet : letters from the lovestruck and lovelorn to Shakespeare's Juliet in Verona. By library.gcpl.lib.oh.us Published On :: Every year, over 10,000 letters addressed to Juliet Capulet arrive in Verona, Italy, the famous hometown of Shakespeare's Romeo & Juliet. These handwritten letters come from people all over the world, seeking guidance and support from Juliet herself. Capturing the pain, joy, humor, and confusion of love, the 60 letters in this book offers encouragement, comfort, hope-and a nod to the human condition. Including responses from Juliet herself, this romantic and relatable, and perfect as a Valentine's Day gift, Dear Juliet proves that love is the universal language. Full Article
v Dear kevin / Amerine Graham. By library.gcpl.lib.oh.us Published On :: Patricia writes to Kevin about some of the the experiences that they shared from her perspective. Full Article
v Dear Lilly : from father to daughter : the truth about life, love, and the world we live in. By library.gcpl.lib.oh.us Published On :: A father offers his advice, opinions, and the many useful stories gleaned from his past experiences in order to help his beloved daughter not only survive, but thrive in the dangerous and unpredictable world of young adulthood. From the pen of a former abused child, drug addict, womanizing frat boy, and suicidal depressive, comes forth the emotionally stirring account of a young man's battle with crippling inner demons and his eventual road to enlightenment. Peter Greyson calls upon his wisdom as both father and school teacher to gently lead teenage girls through a maze of truth, deception, and adolescent uncertainty. Greyson's literary style sparkles with a youthful enthusiasm that will capture your heart and provide boundless inspiration. Dear Lilly is a survival guide that offers the brutally honest male perspective to young women struggling for answers to life's deepest questions. Topics include: Boys lie What every guy wants from his girlfriend Tales from the drug world Everybody hurts High school exposed Full Article
v Dear lord.... Love, Efua! / Amazing Grace Louis Danso. By library.gcpl.lib.oh.us Published On :: Efua has one dream; to make it out of Gedu village as an accomplished author. Through a rare opportunity afforded by her school, Gedu Junior Secondary School, Efua begins on a journey to achieve her dreams. On the road to success, she encounters many obstacles that seem insurmountable: lack of support from an important family member, a broken friendship, and cruelty at the hands of a virtual stranger. Her faith in God pushes her to dream big. But when trials and tribulations hit, will Efuas faith stand the test of time? Will she survive? Can she keep her dream alive? Will God grow silent or respond to the earnest prayers of a 15 year old girl who is on the verge of losing all hope? In Dear Lord Love, Efua! Amazing Grace Lois Danso, author of Bound By Kente, tells an unforgettable, touching tale of the love, faith, and hope of a young girl determined to achieve her dreams in a city that is a melting pot of hospitality and cruelty, dreams and reality, opportunities and disappointments, success and failures. Full Article
v Dear love doctor / Hailey North. By library.gcpl.lib.oh.us Published On :: Daffodil "Daffy" Landry stared at her words of advice to the lovelorn and pressed her hand against her breast. Was she writing about this unknown Casanova...or about herself? Broken Hearts Mended Here Diagnosis Terminal! Charming, sexy, and self-made Hunter James isn't one to back away from a challenge. Slapping his copy of the New Orleans Crescent against his thigh, he approached the newspaper's outer office. How dare that anonymous, autocratic, and insufferable Love Doctor label him as incapable of commitment? Did she ever consider that he simply hasn't met the right woman? He'll uncover the author's identity and give her a piece of his mind. But first, appreciating an opportunity when it presents itself, he's got to meet the beckoning blonde behind the reception desk. Who knows? Maybe the Love Doctor has led him to the woman of his dreams after all... Full Article
v Dear Maggie / Brenda Novak. By library.gcpl.lib.oh.us Published On :: New York Times bestselling author Brenda Novak presents a suspenseful story of a woman searching for the truth. Maggie Russell, a police reporter in Sacramento, works the night shift, and she's finally stumbled on the big crime story that will truly establish her career-if it doesn't end her life. A serial killer who moves from one city to the next. As if things aren't complicated enough, Nick Sorenson, the paper's new photographer, seems to be taking an unusual interest in this case. And in her. Maggie doesn't realize that she's falling in love with a man who's not what he seems to be. A man whose deceptions may save her life. Full Article
v Dear Martha, WTF? : what i found in my search for why / Tricia LaVoice. By library.gcpl.lib.oh.us Published On :: Tricia LaVoice's life turned upside-down when her parents were tragically killed in an automobile accident. Her close relationships with her mother and father made everyday life afterwards a challenge. Happily married and with a beautiful baby girl, Tricia had no time to fall apart. Over the years as her family grew, Tricia met two strong, dynamic women, both survivors of their own life challenges, whose wonderful friendships and unconditional maternal love and strength guide her to trust in life. But tragedy strikes Tricia's family again, shaking her faith in life once more. It was during this time of suffering and loneliness that she found an unexpected respite in nature, in the form of a beautiful pine tree Tricia named Martha. This rare bond inspires Tricia who literally talks to Martha daily as she heals the hurt in her heart. Tricia learns to listen to her inner voice, and heals herself by finding her source of courage and strength is within her. Full Article
v Dear Mendl, dear Reyzl : Yiddish letter manuals from Russia and America / Alice Nakhimovsky and Roberta Newman. By library.gcpl.lib.oh.us Published On :: At the turn of the 20th century, Jewish families scattered by migration could stay in touch only through letters. Jews in the Russian Empire and America wrote business letters, romantic letters, and emotionally intense family letters. But for many Jews who were unaccustomed to communicating their public and private thoughts in writing, correspondence was a challenge. How could they make sure their spelling was correct and they were organizing their thoughts properly? A popular solution was to consult brivnshtelers, Yiddish-language books of model letters. Dear Mendl, Dear Reyzl translates selections from these model-letter books and includes essays and annotations that illuminate their role as guides to a past culture. Full Article
v Teuere Versäumnisse [In German] By www.ifpri.org Published On :: Fri, 17 Apr 2015 2:47:59 EDT Full Article
v [Review of] Lutteken, Antonia. Agrar-Umweltpolitik im Tranformationsprozess -- Das Beisfiel Polen By www.ifpri.org Published On :: Fri, 17 Apr 2015 2:47:59 EDT Full Article
v Welthunger-Index 2016: Die Verpflichtung, den Hunger zu beenden By www.ifpri.org Published On :: Thu, 06 Oct 2016 4:09:28 EDT Die Entwicklungsländer konnten seit dem Jahr 2000 beträchtliche Erfolge bei der Reduzierung des Hungers erzielen. Der Welthunger-Index (WHI) 2016 zeigt, dass der Hungerwert in den Entwicklungsländern insgesamt um 29 Prozent gesunken ist. Die Fortschritte sind jedoch nicht überall gleich groß; zwischen Regionen, Ländern und innerhalb von Ländern gibt es erhebliche Unterschiede. Full Article
v Welthunger-Index 2016: Die Verpflichtung, den Hunger zu beenden: Synopse By www.ifpri.org Published On :: Wed, 12 Oct 2016 4:09:12 EDT Der Welthunger-Index (WHI) 2016 ist der elfte in einer Reihe jährlicher Berichte, in denen die Hungersituation weltweit, nach Regionen und auf Länderebene mithilfe eines multidimensionalen Ansatzes dargestellt wird. Er zeigt, dass seit dem Jahr 2000 weltweit Fortschritte bei der Bekämpfung von Hunger gemacht wurden, dass aber angesichts noch immer „ernster“ oder „sehr ernster“ Hungerwerte in 50 Ländern nach wie vor viel zu tun bleibt. Der vorliegende Bericht stellt den Paradigmenwechsel in der internationalen Zusammenarbeit durch die Agenda 2030 für nachhaltige Entwicklung vor. Full Article
v The Killing of Two Lovers By library.gcpl.lib.oh.us Published On :: David desperately tries to keep his family together during a separation from his wife. They agree to see other people but David struggles to cope with his wife's new relationship. Full Article
v Investir dans la formation professionnelle des jeunes: Programme de formation professionnelle des secteurs agropastoral et halieutique du Cameroun By www.ifpri.org Published On :: Thu, 31 Mar 2022 5:05:01 EDT L’investissement dans les agriculteurs, c’est-à-dire le capital humain de l’agriculture, est crucial pour relever les défis que posent nos systèmes agroalimentaires. Full Article
v Une analyse comparative des méthodes de mise á jour et de rééquilibrage des matrices de comptabilité sociale By www.ifpri.org Published On :: Thu, 29 Sep 2022 5:05:01 EDT Les modèles d’équilibre général calculable (MEGC), largement admis dans la littérature et utilisés comme outils d’analyse d’impacts potentiels de politiques économiques, sont alimentés par des données provenant de la Matrice de Comptabilité Sociale (MCS). Celle-ci appartient à la grande famille des comptes nationaux, représentant l’ensemble des interrelations entre les activités, les institutions d’une économie. Full Article
v Analyse des flux physiques, performances économiques et relations au sein des filières de manioc, de riz, de lait et de poisson au Sud-Kivu et Tanganyika (RDC 2021) By www.ifpri.org Published On :: Sat, 25 Feb 2023 5:05:01 EST Ce document présente une analyse des chaînes de valeur agroalimentaires de manioc, de riz, de lait et de poisson le long du corridor économique entre les capitales provinciales de Bukavu (Sud-Kivu) et Kalemie (Tanganyika) situées dans la partie orientale de la République démocratique du Congo (RDC). Les principales données utilisées pour cette étude proviennent d’enquêtes menées en 2021 auprès d’environ 3000 acteurs conomiques familiaux, y compris des agriculteurs, des transformateurs et des intermédiaires, actifs dans une ou plusieurs des quatre filières ciblées. Full Article
v Afrique de l'Ouest : les tracasseries routières aggravent l'insécurité alimentaire By www.ifpri.org Published On :: Thu, 01 Jun 2023 5:05:01 EDT Créée notamment pour promouvoir le commerce intra-régional de biens dans la région, la Communauté économique des États d'Afrique de l'Ouest devait aussi permettre d'y réduire l'insécurité alimentaire. Mais les « points de sécurité », dressés le long des corridors de commerce par les autorités administratives qui prélèvent des pots-de-vin, sont venus limiter cette ambition. S’élevant jusqu’à 576 dollars aux 100 kms au Togo en 2017, cette corruption se mesure aussi en temps perdu, avec plus de trois heures aux 100 kms. Full Article
v Rapport inventaire, les systèmes alimentaires au Sénégal By www.ifpri.org Published On :: Wed, 13 Dec 2023 5:05:01 EST Depuis la pandémie de COVID-19 et plus récemment la crise russo-ukrainienne, la problématique de construire des systèmes alimentaires résilients et durables est devenue une urgence pour la plupart des pays d’Afrique au Sud du Sahara (ASS) dont le Sénégal. Très récemment, le Gouvernement du Sénégal à travers le Ministère de l’Agriculture de l’Équipement Rural et de la Souveraineté Alimentaire (MAERSA) a validé le Programme Alimentaire pour la Souveraineté Alimentaire Durable (PASAD 2021-2025). Full Article
v The National Gallery presents “Van Gogh: Poets and Lovers” By theartwolf.com Published On :: Tue, 10 Sep 2024 07:04:01 +0000 The National Gallery presents “Van Gogh: Poets and Lovers” To mark its 200th anniversary, the... Full Article