New marketing head at SSP UK

first_imgSSP UK has appointed Lucy Knowles as its new chief marketing officer, responsible for brands such as Upper Crust, Caffè Ritazza and Millie’s Cookies.The firm, which operates restaurants and cafés in railway stations and airports across the country, revealed Knowles will take up the new role on 20 May and will form part of SSP UK’s executive board.She will implement a long-term strategic plan, including developing new products, acquisitions and joint ventures and other growth initiatives as part of her remit.Knowles, who previously worked as managing director for Corney & Barrow Bars, said: “I am hugely excited by the opportunity to be part of the team at SSP and look forward to contributing to the company’s continued success.”Mark Angela, chief executive of SSP UK, said: “Lucy brings with her a drive and charisma that has characterised her career at Corney & Barrow coupled with a natural marketing instinct. We’re delighted to welcome her to SSP.”last_img read more

See More

Spiritual Rez Sing Of Love, Life & Marijuana On New Album “Setting In The West”

first_imgSpiritual Rez have released a new album called Setting In The West. The ten-song effort showcases the band’s musical diversity and relatable lyrics while maintaining the quintessential reggae vibes that they’ve come to be known for.Check out the full album stream here, and follow along with our recap of some of the album’s highlights.Setting In The West kicks off with “Sober”, a slow and plodding tune that showcases the mind of a drunk party-goer who meets the girl of his dreams. The lyrics openly wonder whether this love will last in the morning, once both parties have sobered up, showcasing a reflective attitude that permeates through the EP. “Red Room” is an uplifting tune that features typical, stress-free reggae vibes, advising the listener to “do it right you can’t rewind”. Life is short, and “Red Room” acts as the ultimate reminder to live life to the fullest and happiest. A guest verse by Duddy B of the Dirty Heads rounds things out with a spot-on guest appearance on the track.“Together Always” is a more personal love song, with vocalist Toft Willingham lamenting the stress of going on tour and leaving a jealous significant other at home. The song acts as a reassurance to the jealous lover, discussing the trials and tribulations of being in a relationship while on tour. The lyrics express the strong feelings that the protagonist has for his true love, the girl with a “golden heart” who is waiting for him at home. Vocalist HIRIE adds to the track by playing the role of the lonely girlfriend, providing harmonies and reciprocating the dedication that is on display in the song’s earlier verses.“Square Grouper” is a funky song about finding a large quantity of marijuana in the waters of Florida and profiting from this lucky discovery. For the uninitiated, a “Square Grouper” is a bale of Marijuana that has fallen overboard from a smuggling ship or thrown out of a smuggling plane (the term was coined by the US Coast Guard). In the end, the song tells a tale of wishful thinking, with Willingham singing about taking the risk to search for a “square grouper”, and the hope of becoming a rich man by selling the bounty. While the lyrics are playful, the song tells a vivid tale of desire and fantasy.In the end, this album accomplishes exactly what Spiritual Rez has set out to achieve. Setting In The West is a funky album that tells introspective tales about the search for love, peace, success, and tranquility, all while managing to make these topics fun, relatable, and danceable.last_img read more

See More

David Bowie Collaborators Will Reunite For Special Tribute Concert On Anniversary Of His Death

first_imgIt will be a year since his passing on January 10th, 2016, though the legacy of David Bowie will live on forever. While the tributes have been going on for years, to celebrate the longstanding impression his timeless music has provided, this year has certainly been the year of Bowie. To memorialize the one year anniversary of his death, his closest collaborators will join forces for a tribute show on January 10th at Terminal 5 in New York City.This will be a show from the heart, featuring Mike Garson, Adrian Belew, Earl Slick, Gail Ann Dorsey, Sterling Campbell, and more for “a very special David Bowie concert with Bowie people playing Bowie music Bowie style.” The press release adds, “Individually these former Bowie band members performed, wrote and recorded together with David through several decades including the 1973’s Ziggy Stardust tour, the Diamond Dogs tour, Isolar II (Heroes) tour, to the hugely successful Serious Moonlight tour, the Sound And Vision greatest hits tour to Glastonbury 2000, Heathen, his final A Reality Tour and many of them appeared on Bowie’s triumphant comeback album, The Next Day.” Tickets go on-sale Friday, December 9th at 12PM local time.last_img read more

See More

School aims to broaden diversity, inclusion

first_imgCreating a more welcoming climate for all. Recruiting and retaining a more diverse group of students, staff, research appointees, and faculty. Fostering stronger connections with the surrounding Mission Hill community.These were some of the issues addressed at a Town Hall on diversity and inclusion at Harvard T.H. Chan School of Public Health on October 28, 2015. The event, held in Kresge Cafeteria, was open to the Harvard Chan community.Acting Dean David Hunter and Associate Dean for Diversity Meredith Rosenthal spoke at the event, outlining steps that had been taken in recent months, as well as plans for the future, to boost discussion and action on diversity and inclusion.Hunter said that a recent survey by an outside firm suggests that both the financial challenges of coming to Harvard Chan and the overall climate of the School and Boston can serve as barriers to recruiting underrepresented minorities as well as students from other marginalized groups. So the School is working hard to raise money for student financial aid and to address issues of climate, Hunter said. “We know Boston is not perceived as the most hospitable city in America to people of color. But the culture of our own community is something that we can absolutely… improve,” he said. Read Full Storylast_img read more

See More

5G, IoT and Security: Protecting Emerging Technology

first_imgWith the rise of emerging technology, unforeseen security challenges can appear. As 5G becomes ubiquitous, it’s the machines that need to be protected from human beings. That’s because cybercriminals, hacktivists and industrial spies have set their sights on IoT devices as a massive attack surface for denial-of-service (DoS) strikes, data theft and even global disruption.If you’re a communications service provider reading this, maybe you’re thinking “I’m glad that I’m not responsible for securing all those IoT devices.” But you are. If service providers wish to monetize IoT communications, they’ll need to wrap security around those communications. It’s a big task, compounded by the fact that most IoT devices will be so small that they’ll have no built-in security of their own. The stakes for service providers, however, are too high to ignore: personal data, mission-critical applications and even national security are all at risk from IoT-based attacks.Okay, now take a deep breath: You don’t need to solve all these problems today — the IoT revolution isn’t here yet. But you do need to be thinking about IoT security right now, studying the potential attack surface of new applications (e.g., telehealth services, connected cars) and developing strategies to mitigate the unknown unknowns that will invariably arise as new IoT applications are created and launched.What will this new attack surface look like? Let’s dig deeper into a few high-profile IoT applications to understand the potential security risks.eHealthTelehealth use has taken off in 2020, but it was already becoming a popular alternative to in-person healthcare, particularly in areas where healthcare services weren’t readily available. One risk of telehealth, however, is the transmission of highly personal information that could be subjected to a man-in-the-middle attack. This risk becomes even more serious when you consider the number of connected medical devices that are expected to be activated on 5G networks. For example, what happens when a remote heart monitor is compromised or real-time emergency services are disrupted by a DoS attack? And who underwrites that risk: the communications provider, the healthcare provider or the device manufacturer?Energy providersIt goes without saying that energy services are mission-critical applications. One of the more interesting 5G applications is the use of connected devices to manage smart grids, power plants and municipal energy services such as water and electricity. But what happens if cybercriminals seize control of wireless water meters? Or if a regional smart grid is disrupted? As for safety sensors in nuclear power plants that might manage heating and cooling—well, let’s not even go there.Those scenarios may sound unlikely, but attacks like that have already happened and been highly successful. The Mirai botnet is a classic example. It compromised a massive field of 4G IoT devices that nearly brought down the Internet. An interesting caveat: that malicious code was quickly shared on the Internet for other cyber criminals as well. Yes, cybercrime as a service is a now a thing, and a lucrative one at that.Connected vehiclesThe concept of an Internet-connected vehicle may seem futuristic, but almost every modern vehicle is already a connected device. There are GPS connections, digital satellite radio connections, roadside service connections and collision radar connections. Then there are Bluetooth connections to our smartphones, which are themselves connected to a radio access network. And that’s before we even get into self-driving vehicles.Beyond the safety risks of turning our car into a two-ton IoT device, personal data is also at risk in our car. We can log on the Internet right now and track where our family members are located through their GPS device. Going forward, in-car email and streaming video will be packaged with cars for a monthly fee, creating an even greater need for secure, encrypted communications. When vehicle-to-vehicle communications arrive, new security mechanisms will need to be put in place for that too.Ultimately, service providers will need to extend their view of security to not only address subscribers but the millions of connected devices that ride alongside their network in massive Machine Type Communications (mMTC) slices or support enterprise applications at the network’s edge. This will require the ability weigh risk appetite against opportunity, anticipate the unknown and react to new threats in real time. In other words, 5G will be a very different world for service providers from a security perspective.ConclusionFor a better perspective of IoT security in a 5G world, talk to Dell Technologies. We’re committed to providing service providers with end-to-end security solutions that can effectively monetize 5G opportunities while mitigating risk. At Dell Technologies, we believe the world is better when machines and human beings are working together for a common good.last_img read more

See More

Immigration detainee with COVID-19 dies in Georgia hospital

first_imgCOLUMBUS, Ga. (AP) — Federal authorities said a 57-year-old Mexican man who was being held in immigration detention in southwest Georgia has died from complications of COVID-19. A U.S. Immigration and Customs Enforcement news release says Felipe Montes died early Saturday at a hospital in Columbus from “cardiopulmonary arrest, secondary to complications of coronavirus disease.” Montes entered ICE custody on Dec. 28 and had been held at the Stewart Detention Center in Lumpkin until Jan. 10, when he was admitted to the hospital.last_img read more

See More

Amplifying the credit union message

first_img ShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr Of the 435 representatives and 36 senators who were victorious on election night 2014, 392 had one thing in common: They had support from credit unions.A success rate of more than 90% in 2014 led CUNA President/CEO Jim Nussle to declare a “credit union-friendly majority” had been elected to the 114th Congress.Now, as the country gears up to elect members of the 115th Congress—who will take office in January—credit unions again are involved in this year’s elections.“Research clearly shows that when credit union members receive information about how a candidate has worked to support credit unions, they have a positive response,” says Richard Gose, CUNA’s chief political officer. “Every voter is voting because of some issue. People care about their credit unions, and they understand that it’s a positive thing to have elected officials who keep credit unions in mind.”According to CUNA research, 42% of all registered voters are credit union members, and 23% of registered voters use a credit union as their primary financial institution. continue reading »last_img read more

See More

Ransom demand and held hostage – Netflix’ third-party risk management failure

first_img 117SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr,Jim Hansen As a Senior Consultant at Rochdale Paragon Group, Jim is responsible for providing clients with strategic consulting with an emphasis on governance, succession, risk management and strategic initiatives.  Previously, Jim … Web: www.rochdaleparagon.com Details When I think of a robbery and hostage situation, “Dog Day Afternoon” with Al Pacino comes to mind. But the reality in 2017 is there is likely a greater danger of an organization’s data being held hostage through a ransomware infection or other cyber-attack. Recently, the Netflix series “Orange Is the New Black” was prematurely released to the public by the hacker(s) that goes by the name “thedarkoverlord”. The hacker stole the unreleased television show from a vendor used by Netflix. The postproduction company Larson Studios is apparently a third-party provider to Netflix and a variety of other television and movie studios. The hacker demanded money from Netflix and when they refused to pay, the series was released to the public. More ransom is being demanded from other studios due to the breach. This is the latest in a long line of attacks by cybercriminals in the past few years. With the advent of Bitcoin, cyber-attacks are becoming more prevalent and likely more profitable for the criminals. Bitcoin provides an untraceable form of payment. Criminal success provides assurance these types of attacks are not going away any time soon. According to a data breach investigations report by Verizon; ransomware attacks have increased every year since 2005 and were up 50% in 2016 compared to 2015. Criminal strategies may include threats of deleting information from systems or exposing confidential information. It’s not news that these types of threats exist. Your credit union should have policies, procedures, and practices in place to help protect your data. But, these attacks should also be an important consideration when evaluating and monitoring third-party vendors. Your data is only as safe as your weakest vendor. Do you have a comprehensive program in place to evaluate the cybersecurity of vendors that have access to your data? All third-party relationships are not created equal. You should have a standard practice in place to determine the inherent risk a vendor may pose to your organization. This should be determined during the initial risk assessment stage. Your risk assessment will determine the type of due diligence required. If the vendor performs a critical function or touches sensitive member information you will want to take a deep dive into the vendor’s information security controls and determine if there is potential risk from fourth-party (or Nth party) contractors through that vendor. It’s extremely critical that contracts protect your credit union and are very specific about responsibilities in the case of a data breach. In managing your third parties, the mindset should be not if, but when a data breach will occur. Unfortunately, that’s today’s reality. Once you have completed the risk assessment, conducted appropriate due diligence, and incorporated the appropriate contract clauses, you can then begin working with the vendor. But, this doesn’t mean your job is done. You should expect to conduct ongoing oversight and reviews of the vendor relationship. Any changes to the risk exposure should be documented and addressed to ensure it is still acceptable considering the value provided by the vendor. Ultimately third-party risk management should not be viewed as simply a compliance task or regulatory hurdle. Vendors should be viewed as business partners and maximizing the value of the relationship can create additional opportunities, save costs and potentially enable a competitive advantage. A deep understanding of your vendor’s products and services can help you integrate their capabilities with your long-term strategies. A mature third-party risk management program will enable you to not only mitigate risk but also create additional value for your organization. If you need assistance, or would like more information about Rochdale Paragon’s third-party risk management services, please visit www.rochdaleparagon.com. last_img read more

See More

Fish, Turtle Die-offs Spark Concerns on East End

first_imgSign up for our COVID-19 newsletter to stay up-to-date on the latest coronavirus news throughout New York Thousands of dead bunker fish were found on the shores of Flanders Bay last weekend, two weeks after hundreds of diamondback turtles washed up dead nearby, raising serious environmental concerns on the East End.Preliminary tests suggest that both mass die-offs may be linked to a recent red tide, a condition created by an excess of algae in the water that studies have shown is caused by increased nitrogen levels stemming from septic systems, storm-water runoff and sewage plants. The turtles are believed to have eaten shellfish made poisonous by the algae bloom, and the fish appear to have suffocated because the water had low oxygen level as a result of the red tide, experts said.“Unfortunately, in a situation where oxygen is already suppressed and a large amount of fish [are present], there isn’t enough oxygen for the fish to survive,” said Kevin McAllister, a marine biologist who is founding president of Defend H2O, a nonprofit environmental group. “We’ve reached the tipping point of too much nitrogen and now we’re seeing problems with our water bodies.”The New York State Department of Environment and Conservation (DEC) determined that the fish kill was a result of hypoxia, the medical term for oxygen deprivation. The agency also preliminarily determined that the turtles were poisoned by saxitoxin, a toxic byproduct from algae consumed by the shellfish that the diamondbacks eat, although the DEC is awaiting the results of further tests to be sure.Shortly before the die-offs, increased saxitoxin levels prompted the DEC to issue a ban on shellfish harvesting in Meetinghouse Creek and Terry Creek, both tributaries of Flanders Bay, and James Creek, a tributary of Great Peconic Bay.Bunker fish, which often swim in extremely large schools, tend to consume large amounts of oxygen, meaning they may have hastened their own demise, environmental experts said. Low dissolved oxygen levels are common for the summer months in the area due to the sudden rise in water temperatures, but fish kills are still taken seriously.Mass marine-life die-offs are not uncommon in Long Island waters, but these back-to-back events made the region take notice. Among recent events were hundreds of dead bluefish were that washed up in Mecox Bay two years ago. That case was blamed on low water temperatures.“Such occurrences will become the norm if we don’t reduce 30-50 percent of the nitrogen going into the Peconic Estuary,” said Kevin McDonald of The Nature Conservancy on Long Island, in a statement. “While some strides have been made to reduce nitrogen in our waters, the longer we wait to fix our water quality problems, the worse it will get, the longer it will take and the more expensive it will be.”Some people were awaiting more information before they could be sure there is a clear link. Karen Testa, the executive director of the Turtle Rescue of the Hamptons, said that she wants to see pathology test results performed on turtles and fish by scientists at Cornell University so she can definitively know whether there is a connection.The DEC is encouraging community members to report any additional fish kills or other marine life problems by calling 631-444-0430 or emailing [email protected] with the subject line “fish kill.”last_img read more

See More

Garth George: The consequences of euthanasia can extend to being diabolical

first_imgNZ Herald 19 November 2014Like the pro-abortion lobby back in the day, the proponents of legalising euthanasia never give up.Within weeks of the election, Labour’s Palmerston North MP Iain Lees-Galloway has taken over responsibility for the End of Life Choice Bill after sponsor Maryan Street failed to get re-elected.He is gauging support in the new Parliament before deciding whether to put it back in the private members’ bill ballot.I bet he does. The bill would allow people aged 18 or over to be helped to die if they were proved mentally competent by two doctors, after consultation with family, and after a “stand-down” period of a week.I have written on this subject before, but it pays to remind ourselves of the murderous consequences of legalising suicide. And as one who has terminal cancer I reckon I have the right.I have no fear of death; I will go, I hope willingly, when the Lord calls my name.http://www.nzherald.co.nz/rotorua-daily-post/news/article.cfm?c_id=1503438&objectid=11358606last_img read more

See More