50jili
LeBron James ruled out of Lakers' game at Minnesota on Friday with foot sorenessTitle: "The Blues' Return to Title Contention? Mahrez Gives Chelsea Fans the Courage to ‘Dream’"
TALLAHASSEE — Matt Gaetz’ knack for courting controversy has finally caught up with him. The right-wing firebrand, political prankster, steadfast Trump defender and party animal stepped down as the president-elect’s choice for Attorney General once it was made clear to him he didn’t have the needed support in the U.S. Senate. Javascript is required for you to be able to read premium content. Please enable it in your browser settings.
- Health conditions: Certain medical conditions, such as sleep disorders or chronic pain, can affect sleep quality and quantity.
Stena RoRo takes delivery of the battery hybrid vessel Guillaume de NormandieUndercover FBI agents had no role in US Capitol attack: report
UMass hockey head coach Greg Carvel’s biggest concern coming into the 2024-25 season was his team’s back-end. The Minutemen lost defensemen Scott Morrow and Ryan Ufko, two staples on the blue line for three years, to the professional ranks. The duo combined for 56 points a season ago and ate up a ton of critical minutes. Aaron Bohlinger, Elliot McDermott and Sebastian Tornqvist all transferred and Samuli Niinisaari departed via graduation, making six total defensemen from the 2023-24 team that would not be back. Freshmen Francesco Dell’Elce and Larry Keenan have carried over their chemistry from the Penticton Vees of the British Columbia Hockey League to Amherst and have been UMass’ second D-pair for a majority of the opening 17 games. Freshman Finn Loftus has also seen spot duty as the rotating seventh defenseman. But the addition of junior transfer Lucas Olvestad, who was part of Denver’s national title-winning squad a year ago, has made the biggest impact to this year’s UMass group, according to Carvel. “He’s our identity, he’s big, he’s fast, he’s hard, he’s competitive, he’s vocal, he has a presence to him and we needed that with a young back-end, we needed it badly,” Carvel said. “I can’t imagine where we’d be without him.” Olvestad has linked up with junior Owen Murray on the Minutemen’s first D-pair and has seen a boost to his offensive numbers . The rearguard from Stockholm, Sweden has already surpassed his career high in goals (three) and points (seven), and recently earned a shot on the second power-play unit. Olvestad scored against then-No. 11 Boston University on Dec. 7 during a UMass five-minute man-advantage. Article continues after... Cross|Word Flipart Typeshift SpellTower Really Bad Chess “It’s definitely a new thing this year,” Olvestad said regarding his previous power play experience. “Something I’ve done in the past, didn’t really get that opportunity at Denver, but a role I’m comfortable in and I think our unit has done really well recently.” According to collegehockeynews.com, Olvestad is averaging the most ice-time among Minutemen skaters at 23:07. Dell’Ece is the next closest at 21:38 per game. “I think coming in with experience and kind of being put in that role right away kind of put the pressure on,” Olvestad said. “Every day just get better, so it’s been pretty easy, the motivation is definitely there.” Along with returners Kennedy O’Connor, captain Linden Alger and Murray, Olvestad has helped shore up a D-corps that was leaky during the first month of the season, but has improved to the point where the Minutemen are allowing 2.53 goals-per-game on average. “We talk about the young defensemen, but we needed an old defenseman to come along too,” Carvel said. “To me, he’s been the most important addition to our team this year.” INTERNATIONAL GAMES – Sophomore goalie Michael Hrabal is expected to make Czechia’s World Juniors roster for the upcoming 2025 World Junior Championship in Ottawa, with games beginning Dec. 26. Hrabal went 3-2 in goal for his country during last year’s World Juniors tournament as part of the bronze-medal winning Czechia team. Hrabal posted a 3.40 goals-against average and a .877 save-percentage in seven games played. Should Czechia put together another lengthy run, UMass could be without their starting goalie for both games of the Desert Hockey Classic in Arizona, which kicks off on Jan. 3. The Minutemen are going to need Hrabal’s A-game whenever he returns to the lineup as the 6-foot-7, 215-pound tender will have a huge say in guiding them to the NCAA Tournament. “He’s young, he’s 19,” Carvel said. “I think if you asked most parents about their 19-year-olds, they wouldn’t trust them to do too much. He’s a high-level prospect and plays a big role and I think his immaturity was shown at the beginning of this year. He was very inconsistent, but I think he’s going through a very good growth phase. He’s taken big steps.” Carvel also noted his “biggest regret” of the first half was not pulling Hrabal earlier during UMass’ 4-0 loss to Vermont on Nov. 9. Freshman Daniel Jencko has also made the preliminary roster for Team Slovakia. Should Jencko make the team, he’ll face off against Hrabal in the round robin stage. Czechia and Slovakia are scheduled to play on Dec. 29. REWIND & FAST FORWARD – Following a 4-2 loss to No. 13 BU on Wednesday, UMass’ first half of the season is officially in the books. Consistency was hard to come by as the Minutemen did not win more than two consecutive games at any point through the first 17 games and enter the semester break with a 8-7-2 record. UMass’ best stretch came from its 5-1 win at Providence onward as it took wins in four of its last six games before the halfway mark. The Minutemen were great in non-conference games, compiling a 6-2-0 record, but only managed two victories in Hockey East play. That number will have to improve if they want to be an NCAA Tournament team come the end of the season. Speaking of which, UMass is currently 21st in the Pairwise rankings, which is a system used to select which teams make the NCAA Tournament. Only the top-16 teams make the tournament, so the Minutemen will either need to win the Hockey East Tournament to guarantee themselves a spot, or start racking up the wins in 2025 to receive an at-large bid. One of the factors used in Pairwise rankings is Ratings Percentage Index (RPI), which weighs games differently whether or not they were at home or on the road. Essentially, road wins and home losses are weighted more than home wins and road losses. UMass would be best served improving upon its two wins at Mullins Center for the second half, to avoid the home-loss point deduction. The Minutemen made up for it in the first half, winning five road games, but generally, winning at home avoids issues in the Pairwise. “You’re aware of it,” Carvel said on when he starts paying attention to the Pairwise rankings. “I was kind of curious, I didn’t know when the Pairwise started clicking in, I was curious where we were going to be because we lost some games we shouldn’t have lost. “I said to the team, let’s not put ourselves in a position where we’re waiting to see what a NCHC team does to determine our fate,” Carvel said. “We’re now at a place where we can determine our own fate. There’s some teams ahead of us that I think we can catch but it’s going to be up to us.” After its tournament in Arizona, 15 of UMass’ final 17 games will be Hockey East matchups. It’s lone non-conference series will be against Alaska in late January for a two-game set at Mullins. In short, the Minutemen have to win more games than not once the campaign picks back up in January to fulfill their postseason aspirations, with an emphasis on home wins against Hockey East teams, in particular.
The Dallas Cowboys (3-7) visit the Washington Commanders (7-4) on Sunday, November 24, 2024 at Commanders Field and will aim to break a five-game losing streak. What channel is Commanders vs. Cowboys on? What time is Commanders vs. Cowboys? The Commanders and the Cowboys play at 1 p.m. ET. NFL STATS CENTRAL: The latest NFL scores, schedules, odds, stats and more. Commanders vs. Cowboys betting odds, lines, spread Commanders vs. Cowboys recent matchups Commanders schedule Cowboys schedule NFL week 12 schedule This content was created for Gannett using technology provided by Data Skrive.In the end, the true meaning behind Son's flag-throwing incident may remain open to interpretation. It could have been a spontaneous act of celebration or frustration in the heat of the moment. Or, it could have been a calculated message to their rivals and the footballing world. Regardless, it has sparked discussions and debates among fans and pundits, adding another layer of intrigue to the intense rivalry between Tottenham Hotspur and Arsenal.
McFeely: Where does NDSU's semifinal win over SDSU rank in program's playoff history?Off the field, Till is known for his humble nature and dedication to his craft. He is often the last player to leave the training ground, always looking to improve and push himself to new heights. His commitment to the game and his willingness to learn from his more experienced teammates have earned him the respect of his peers and coaches alike.Evans first portrayed the patriotic superhero in "Captain America: The First Avenger" back in 2011, and went on to reprise the role in several other Marvel films, including the Avengers series. His portrayal of Captain America was widely praised for its depth, sincerity, and unwavering sense of justice, making him a beloved character among fans of the MCU.From the season’s outset, Timberwolves coach Chris Finch said Minnesota would leave itself the flexibility to close games with whatever lineup the coaching staff felt was needed to secure a victory. ADVERTISEMENT Sometimes, he noted, he’d get the choice right. Surely, there would be other times when he wouldn’t. “Hopefully, I do way more than I don’t,” Finch said this week. Sunday evening, however, was a checkmark in the “not right” column, at least based off the result. The Timberwolves didn’t score in the final 4:47 of their loss to Golden State. Finch said this week that Mike Conley’s inclusion in the closing lineup would’ve added organization to the equation. But he was quick to add that, with the ill-advised shots Anthony Edwards was taking, may not have mattered. ADVERTISEMENT Finch also reiterated what he said after the game, that Nickeil Alexander-Walker was playing “so well,” so he was hesitant to take him off the floor. “Maybe the other thing I could’ve done was go small,” Finch said, “but we’ve not really done that a ton.” That was the cry of many Wolves’ followers on social media on Sunday. Minnesota has proven rather inept at late-game offense when Conley isn’t on the floor. But all recognized Alexander-Walker had also earned the opportunity to close. You certainly won’t take Edwards off the floor in those situations, and the Wolves wanted Jaden McDaniels on the floor to guard Steph Curry. That left Julius Randle and Rudy Gobert as the only options to take off the court in favor of Conley, and that would’ve left Minnesota small. And, as Finch noted, the Wolves simply haven’t gone small this season. Like, at all. None of Naz Reid, Randle or Gobert have played more than 17 minutes this season without another big man next to him. ADVERTISEMENT It’s not something the Wolves practice, either. McDaniels said he’s only repped minutes at the four in practice when one of the bigs have been unavailable. Still, Finch said it wasn’t that he was “uncomfortable” rolling out a small-ball look Sunday. “But I worry a lot about rebounding. We struggle to rebound with our bigger lineups, at times. So, I know our smaller lineups have really struggled,” Finch said. “That’s some of the reason not to go small is really rebounding issues. But I think our guys are comfortable playing in all different combinations. But I haven’t really thought about going small, necessarily.” ADVERTISEMENT Indeed, Minnesota is just 12th in the NBA this season in defensive rebounding rate, grabbing 71.3% of opposing missed shots. The glass was especially an issue Sunday, as Golden State grabbed 14 offensive rebounds that led to 19 second-chance points. But it’s worth noting many of those came by guards in situations in which size was no factor on the play. McDaniels said he’s comfortable playing any position, including the power forward slot. And Minnesota certainly has the wing depth to roll out more small ball lineups if the situation ever called for it. There could be a playoff matchup that does just that, though Finch noted it could also go the other direction where the Wolves’ advantage would be to lean bigger. Versatility rules come April and May. But the Wolves don’t seem overly urgent to trot out any small-ball looks just to see how they perform at this juncture in the campaign. ADVERTISEMENT “Usually, it’s better with Naz at the four (than me),” McDaniels said. There is, however, at least one proponent of doing a little experimenting: Conley. “I think (small ball) kind of promotes a different level of spacing and speed to the game. You’re going to have to rely on guard-guard situations, guard pick and rolls,” Conley said. “Maybe me setting the screen and roll, Just creating different advantages for ourselves, as opposed to our typical offense or typical flow of things. I would love to see it, maybe — see how it works.” ADVERTISEMENT ______________________________________________________ This story was written by one of our partner news agencies. Forum Communications Company uses content from agencies such as Reuters, Kaiser Health News, Tribune News Service and others to provide a wider range of news to our readers. Learn more about the news services FCC uses here .
THERE used to be a division between the energy company’s information technology (IT) and operational technology (OT) networks. However, the digitalisation of generation-transmission-distribution-retail systems has seen the convergence of these ecosystems. While making the organisation more efficient and responsive to stakeholder expectations, it has a downside. The integration of the ecosystems presents a significantly enlarged playground for cyberthreat actors to play hit-and-run games that are nefarious in intent and outcomes. What is alarming is the rise in the frequency and intensity of such cyberthreats and attacks in recent years. This has required the energy sector to scrutinise its readiness in the face of potential cyberattacks, or in some unfortunate cases, in the wake of one. While every part of the value chain is vulnerable, what is of concern is the OT space, which is not as secure as IT. This has now become the focus of energy companies. Energy Malaysia spoke to Rahayu Ramli, Head of Cyber Strategy & Architecture, Petroliam Nasional Bhd (PETRONAS), who provided insights on how PETRONAS and the energy sector as a whole are securing themselves against existing and oncoming cyberthreats. “The energy industry has been a geo- and socio-political tool for decades, highlighting the influence of the industry on the economy, society and way of life. “The rise of cyberwarfare as a component of national and private arsenals has only amplified the issue, moving from field wars such as in the Gulf States in the nineties to guerrilla tactics in cyberspace today due to pervasive industry digitalisation,” said Rahayu. In the complex energy sector, technology can be divided primarily into IT (for example, laptops, mobile devices, servers, cloud and similar) and OT (for example, Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Supervisory Control and Data Acquisition System (SCADA), Industrial Control Systems (ICS), Distributed Control Systems (DCS), Human Machine Interfaces (HMIs) and similar. Historically, these environments were kept mostly separate. However, the industry is seeing the lines blurring between IT and OT with the increased reliance on digital tools, the cloud, and the growing use of remote operations. There is a definitive increase in the use of Internet of Things (IoT) and robotics, the sharing of OT data, the implementation of ruggedised mobile devices and personal wearables – all extending beyond what used to be a relatively static OT security perimeter. Unfortunately, the convergence of IT and OT ecosystems is also potentially a wonderland of attack vectors and entry points into systems of varying criticality and importance. Cyberthreat actors can range from nation-state adversaries, who seek to disrupt the critical infrastructure of their foes (and allies), to hacktivists who seek to make political statements about the environment, economics or society in general. OT space vulnerability In many energy companies, there is a re-examination of the segregated approach by which OT landscapes have been previously designed and protected. “IT security has been an aspect of technology operations for decades. On the other hand, OT cybersecurity as a specific practice is a relatively new focus,” said Rahayu. “As such, there is renewed interest to ramp up security in the OT space, with new startups, products and investment channelled towards mitigating existing and oncoming cyberthreats. It is an exciting but also an unpredictable space to be in at the moment.” Besides external factors, internal ways of working may also contribute to the vulnerabilities within the connected IT and OT ecosystem, where system availability is critical and downtime avoidance is paramount. While digital transformations have spurred innovation and accelerated technological advances, the speed of application and pressure of delivery has often caused system security to take a back seat. “Eventually, it is addressed but often after a system is live and operational, and in some unfortunate cases, only after a breach or incident has occurred,” pointed out Rahayu. Additionally, increased digitalisation across a supply chain of vendors and partners is creating flexibility and options in products and services. The flip side is that it expands the exposure to unfortunate breaches or incidents, starting at one supplier and cascading down the network of companies and users. Polycrisis scenario The “Global Risks Report 2023” published by the World Economic Forum introduced the term “polycrisis”, which translates to “a cluster of related global risks with compounding effects, with an overall impact that exceeds the sum of each part”. The energy industry is no stranger to this scenario, given its volatility and uncertainty in recent years resulting from the energy transition and rapid digitalisation. The global risk scenario also includes cyber risks that are borderless. The industry as a whole expects cyberthreats to continue to increase against IT and OT assets and operations, as energy companies become more reliant on connected digital technologies to operate. Individual companies have embarked on their own journey to reevaluate and improve their security posture, acknowledging that the support required to do so is not purely driven by technology, but more importantly, must also be supported by education of the entire organisation, and a continuous review and revamp of its security capability and requirements. The work cannot be done in silo either. It requires support and collaboration across the industry to minimise blind spots that may affect everyone in the industry and the communities that interact with them. Rahayu said, “At PETRONAS, we have various cybersecurity memoranda of understanding (MoUs) with vendors to help us better focus our efforts in designing a more secure OT technology. “We also engage with other industry players for knowledge exchange and upskilling. In addition, we work closely with non-profits and academia to raise awareness on the importance of cybersecurity, of how it applies to our daily lives and to also scout for potential talent. “The general aim of these types of collaboration is that the integration of the IT and OT ecosystem across people, processes and technology will eventually lead to an equilibrium of a hybrid-skilled cybersecurity workforce (within and beyond PETRONAS), creating a more sustainable loop to manage and respond to any cyberthreat that may appear on the immediate horizon,” she added. Securing the cyberspace environment From the onset of its digital transformation journey in 2017, PETRONAS recognised the importance of establishing a cyber secure environment across the entire organisation. “It was the prerequisite for PETRONAS going digital,” said Rahayu. “As the organisation became more data-driven in decision making and needed to incorporate new and different technologies more rapidly into various portfolios, it made sure that every move was made securely. This approach became one of the cornerstones of the PETRONAS digital transformation strategy. “It saw the establishment of the PETRONAS cybersecurity function as a single point of accountability to oversee IT and OT – to govern, steer and shape the minimum requirements to sustain the targeted level of cybersecurity maturity,” she added. PETRONAS embraces OT security through the secure-by-design approach, with cybersecurity-related requirements as part of the PETRONAS Technical Standards (PTS). It began with a focused project known as the real-time OT (RTOT) programme, to design and implement a new standard, architecture and roadmap to manage its IT and OT patch management and OT asset management in near real-time. “Our OT footprint is large, thus we focused on assets considered to be the crown jewels of the organisation and continue to deploy this programme across our local and international sites,” said Rahayu. When PETRONAS completes the initial RTOT programme, it will continue to expand secure capability into other aspects of OT. “Identity is a complex area within OT,” added Rahayu. “It is an area of particular concern given the distributed nature of our OT systems. “While IT has always had the advantage in establishing more robust identity and access management, we are exploring ways to do the same for our OT environment and are working towards eliminating the use of shared accounts, establishing proper identity governance and ensuring secure remote access.” There is also emphasis on having a robust all-encompassing cybersecuritygovernance structure. The launch of the organisation-wide Enterprise Cyber Security Governance Framework (ECSGF) was followed by a customised OT programme in early 2023, underscoring its importance as well as its vulnerability. As a result, cybersecurity risk assessments are now part of the Management of Change (MOC) process for both greenfield and brownfield projects to guide design in the OT environment. These initial steps have laid the foundation for the real-time visibility of PETRONAS’s assets and cyber vulnerabilities in order to remediate based on the business criticality. Meanwhile, employees and other stakeholders are continuously kept up to date on secure behaviours through the Human Firewall programme, which emphasises the need for staying alert at work, home and play. This programme is run through a combination of training, communication and community engagements, and supported by an extensive network of cybersecurity change agents who champion the message and awareness across our business and sites. There is also continuous staff training to ensure they have the appropriate cybersecurity knowledge to support their day-to-day work. For example, business system owners are required to attend training on cyber risk management for the systems they oversee; lead OT focals at site are assigned training on OT cybersecurity upon joining and refreshed every two years to ensure they have the latest cybersecurity knowledge with respect to the systems that they work with. Protecting hotspots PETRONAS uses a risk-based approach to cybersecurity that allows it to identify critical systems effectively, thus enabling “hotspots” to be more rigorously protected, while ensuring that there are safeguards in place at every level of the company’s technological (defence-in-depth) and organisational landscape. This involves organisation-wide governance and policies as well as continuous education and awareness across the employee population. A primary concern is the OT environment, where complex systems have a much longer lifespan and maintenance/ updates require meticulously scheduled downtimes in very specific parts of the year. This is one of the main reasons why PETRONAS has deployed the RTOT programme as a priority to enhance security practices, address potential vulnerabilities and minimise the impact of cyberthreats. At the other end of the spectrum, it has been consistently shown that people remain one of the biggest weak points in any organisation. Social engineering through methods such as phishing remains a primary way into a company’s systems. According to the Cofense Phishing Report 2022, 67% of all phishing attempts are meant to steal login and password details from their victims. This is so prevalent that it is estimated that more than 90% of company networks around the world can be penetrated by cybercriminals. Breaches can occur in IT or OT in this manner, and while threat actors may not gain immediate access to a given critical system, gaining a foot in the door through an employee’s login credentials may be sufficient to drop malware, trigger a ransomware attack, or stage a long-term reconnaissance programme by lurking in their victim’s environment, an example of what’s known as Advanced Persistent Threats (APTs), which can lead to even more malicious activity like data theft. Rahayu added, “I can tell you that phishing attempts remain a constant. ‘Think before you click’ is one of PETRONAS’ main cybersecurity taglines, and we also regularly see threats through potentially exploitable vulnerabilities in both new applications and older systems. “Part of being secure is accepting that threat actors have a lot of patience and creativity when it comes to planning attacks, which now is even simpler with the use of AI-augmented tools. “They also have no shame in sharing their methods, for example, entire businesses have been set up around ransomware-as-a-service (RaaS). So, one type of safeguard is never enough, and it is crucial that security is designed and applied through an enterprise lens and as an integrated part of the organisation’s strategy and operations.” Reality checks by government and industry In Malaysia, the National Critical Information Infrastructure (NCII) has been a codified priority since 2006, when the National Cyber Security Policy (NCSP) was initially developed. The energy sector features prominently among the 11 sectors identified in the NCSP. In recent years, there have been specific events that have triggered more immediate actions to re-examine the security posture of complex cyber-physical systems. These are wake-up calls, urging both proactive and defensive actions against the evolving threat landscape. While attacks such as Stuxnet on Iran’s nuclear centrifuges and the NotPetya ransomware attack may no longer be considered part of recent memory, Governments and businesses around the world are constantly kept alert by the continuous wave of cyber incidents. Among the recent newsmakers are the Solarwinds supply chain breach in 2020; the Colonial Pipeline ransomware incident and Kaseya supply chain breaches in 2021; and the MOVEit data breach in 2023 that affected hundreds of organisations and millions of individuals. The energy sector has moved towards deeper conversations regarding cybersecurity to better understand the threats that the community may face collectively. Organisations have become more open to collaboration and knowledge sharing, contributing experiences and lessons learnt to conversations across critical infrastructure forums such as those led by the European Union Agency for Cybersecurity (ENISA) and the US National Cybersecurity Center of Excellence (NCCoE). In 2022, the World Economic Forum launched the initiative “Cyber Resilience in the Oil and Gas Industry” as a collaboration with more than 50 companies and Government Agencies, with the goal of establishing a blueprint for governing and managing cyber risk and unifying its approach to safeguard digital infrastructure and assets. The Energy Benchmarking Group (previously known as Oil & Gas Benchmarking Group, or OGBG), provides an avenue for energy companies to review their operational benchmarks against others in the industry, while hosting strategic conversations around key topics such as safety and security. In Malaysia, there are ongoing discussions and planning to protect the country’s National Cybersecurity Information Infrastructure (NCII). There is also close collaboration with the ASEAN-Singapore Cybersecurity Centre of Excellence for upskilling and knowledge sharing of regional talent and capabilities. Operationally, NCII stakeholders work closely with the relevant Government Agencies to ensure accurate and timely incident reporting, and to establish and maintain organisational certifications such as the ISMS ISO 27001. Malaysian energy companies are also known to collaborate with the Department of Standards Malaysia to adopt the IEC 62443 Standards to be part of the Malaysian Standards (MS). The aim of this initiative is to ensure that the standards are more accessible and affordable to local industry players, not just the end users but system integrators and vendors as well. “In the event of a cyberattack, the ability to respond and recover quickly is heavily dependent on the strong fundamental capability to identify, detect and protect the target,” adds Rahayu. The Energy Commission’s Perspective “Our regulator to ensure a secure, uninterrupted, and reliable power supply ecosystem as stipulated by the Electricity Supply (Amendment) Act 2015 that governs the Malaysian electricity supply industry,” says Khairol Fahami, Senior Deputy Director of the Information Management and Technology Unitof the Energy Commission. “The Commission expects industry players to follow proper guidelines where cybersecurity is concerned but on the whole it is up to the them to decide what works best. Companies are strongly encouraged to follow global best practices for cybersecurity,” says Khairol. “Unfortunately, the rapid convergence of information technology (IT) and operational technology (OT) networks have given rise to unprecedented challenges,” he points out. “Many in the energy sector feels that cyberattacks can just strike upon them without any prior warning. What can energy companies do to protect themselves from cybersecurity attacks? The mostcrucial step is to identify areas that are vulnerable to attack and strengthen them. “From the Commission’s perspective, organisations must make the right investments to strengthen theirsecurity ecosystems. They should also have in place the correct policy and strategy to ensure the agility and flexibility to recover quickly in the event of an attack. Among their priorities should be institutional cyber hygiene. Poor cyber hygiene includes weak passwords or the lack of passwords, outdated software or poor physical security,” says Khairol. Institutional cyber hygiene is a priority at the Commission, which undergoing its digitalisation programme. As a standard practice, the Information Management and Technology Unit has a strict schedule to remind staff to change passwords and to monitor and check their emails for the slightest aberration. Regular education and engagement sessions are also held to ensure everyone plays a role in cybersecurity and befully aware of the threats that are lurking in cyberspace. “As a policy, the Commission adopts a ‘Zero Trust’ approach where cybersecurity is concerned. Anyone, willing or unwilling – or, in some cases, unknowing – could be the weak link in the cybersecurity chain,” he says. Rahayu Ramli, Head of Cyber Strategy & Architecture, Petroliam Nasional Bhd (PETRONAS),
Australian High Commissioner to Sri Lanka Paul Stephens and his team met recently Export Development Board (EDB) Chairman and Chief Executive Mangala Wijesinghe to strengthen bilateral trade relations between the two countries. Over the past 75 years, Sri Lanka and Australia bilateral relationship has vastly expanded over through deep people-to-people ties, trade and investment, tourism, culture and sports. This relationship is strong and enduring, underpinned by shared history and common values. Trade and investment between two countries have been increasing over the time. Australia ranks as the 11th largest export destination for Sri Lanka, with total exports amounting to $ 226.51 million in 2023. It also stands as the 24th largest source of imports for Sri Lanka, with total imports valued at $ 185.89 million during the same period. This results in a favourable trade balance for Sri Lanka of approximately $ 40 million. Wijesinghe elaborated on the new Government’s vision for export development, highlighting the critical role of partnerships in fostering Foreign Direct Investment (FDI). He emphasised the Government’s commitment to streamlining and expediting the approval process for FDIs to create a more investor-friendly environment. Additionally, Wijesinghe underscored the necessity for Sri Lanka to align with global manufacturing trends to integrate into international supply chains. He stressed the importance of enhancing bilateral trade relations with Australia as a key step toward achieving this goal and strengthening Sri Lanka’s position in the global market. The High Commissioner explained the potential for Australia to invest in the Mineral Sector in Sri Lanka as well as joint ventures on export led manufacturing. Further he explained the interest of Australian companies to invest in Sri Lanka targeting export-led manufacturing and processing. Especially, develop Sri Lanka as a commodity hub for the value adding of Australian agri commodities targeting export markets under the benefits of free/preferential trade agreements. Both parties agreed to discuss further on the possibility of implementation of this proposal. Australia and Sri Lanka maintain a robust trade relationship underpinned by a framework arrangement and development cooperation. The Australia-Sri Lanka Trade and Investment Framework Arrangement (TIFA) serves as a cornerstone for advancing economic collaboration between the two nations. The TIFA action plan focuses on key areas such as facilitating quarantine processes for agricultural exports, promoting investment programs, enhancing market access for SME exports, attracting high-end tourists, and fostering partnerships for broader adoption of digital technologies. In 2023, Sri Lanka’s major exports to Australia included apparel, tea, rubber tires and tubes, rubber gloves, motor vehicles and parts, as well as edible preparations. Conversely, the primary imports from Australia consisted of lentils, cereals, meat preparations, dairy products, pharmaceuticals and paints. The EDB has identified significant opportunities to expand exports to Australia in sectors such as apparel, tea and mate, plastics and rubber products, fish and shellfish and paper products. Both nations are committed to strengthening bilateral trade ties by fostering productive dialogues, engaging proactively with business communities, encouraging and facilitating trade and investment, transferring modern technologies and resolving trade and investment-related challenges. These efforts aim to create a conducive environment for business growth and unlock new opportunities for collaboration. Australian Deputy High Commissioner Lalita Kapur, First Secretary Dr. Paul Zeccola, Austrade Country Manager Shameel Javadh, Austrade Director Education Saduni Seneviratne and senior EDB Officials also participated at the discussion.Middle East latest: Syrians celebrate Assad's fall as US seeks a peaceful political transitionTitle: Collaborating with the Syrian Democratic Forces Alliance? Removing Terrorist Designations? US Officials Speak Out
On the other hand, critics may argue that Mr. Smith's behavior could be construed as controlling and overly intrusive. By monitoring Sarah's every online move, restricting her access to certain websites, and demanding access to her personal accounts, he may inadvertently be stifling her independence and autonomy. Adolescence is a critical period of development where teenagers begin to assert their individuality and explore their identities, and excessive parental intervention can hinder this process.
- Previous:
- Next: 50.jili