How does Wisconsin’s coach view Michigan’s defense. What challenges does Michigan’s offense present to the Badgers. Why is Wisconsin not focusing solely on stopping the run.
Paul Chryst’s Assessment of Michigan’s Revamped Defense
Wisconsin head coach Paul Chryst recognizes the significant improvements in Michigan’s defense under new coordinator Mike Macdonald. Despite Wisconsin’s offensive success against Michigan in recent years, Chryst anticipates a much tougher challenge this time around.
Michigan’s defense has been impressively stout so far this season, ranking fourth nationally in scoring defense (allowing just 11 points per game) and 34th in total defense (304.8 yards allowed per game). These statistics indicate a marked improvement from previous years.
What Makes Michigan’s Defense Different This Year?
- Increased unpredictability with mixed fronts and coverages
- Players executing confidently and at high speed
- Versatile scheme that adapts to different situations
- Experienced players in better positions to succeed
Chryst notes that while many of the same players from last year remain, their performance has significantly improved. He attributes this to the new defensive scheme and the players’ increased confidence in their roles.
The Challenge of Michigan’s Multi-Faceted Offense
While Michigan’s defense has garnered attention, Chryst is equally impressed by the Wolverines’ offense. The Maize and Blue have been putting up impressive numbers, averaging 40.3 points (16th nationally) and 454.8 yards (33rd) per game.
Key Aspects of Michigan’s Offensive Prowess
- Dominant run game (290.8 rushing yards per game, 5th nationally)
- Balanced attack with multiple weapons
- Solid offensive line play
- Efficient quarterback play from Cade McNamara
Chryst emphasizes that Michigan’s offense forces defenses to “defend the whole field,” making it challenging to focus on stopping just one aspect of their game.
Wisconsin’s Defensive Approach: Beyond Stopping the Run
Despite Michigan’s heavy reliance on the run game (74% of offensive snaps), Wisconsin’s coaching staff is preparing for a more comprehensive offensive attack. Wisconsin defensive coordinator Jim Leonhard stresses the importance of not falling into the trap of solely focusing on stopping the run.
Why Is Wisconsin Preparing for a Balanced Attack?
- Michigan’s talented receiving corps and tight ends
- Quarterback Cade McNamara’s proven ability to make plays
- Potential for Michigan to exploit one-on-one matchups in the passing game
- Need to defend against play-action and deep passing threats
Leonhard acknowledges that while Michigan has been committed to the run, they have the personnel and scheme to create mismatches in the passing game when defenses overcommit to stopping the ground attack.
The Impact of Michigan’s New Defensive Coordinator
The arrival of Mike Macdonald as Michigan’s new defensive coordinator has brought about significant changes in the Wolverines’ defensive approach. This shift comes after Michigan’s struggles against Wisconsin in recent years, which contributed to the departure of former coordinator Don Brown.
How Has Macdonald Changed Michigan’s Defense?
- Implemented a more diverse and adaptable scheme
- Improved player positioning and utilization
- Enhanced the defense’s ability to disguise coverages and blitzes
- Fostered increased player confidence and aggression
Chryst notes that under Macdonald, Michigan’s defense is “playing really fast,” which he interprets as a sign of the players’ confidence in their assignments and the overall defensive strategy.
Wisconsin’s Offensive Struggles and the Michigan Challenge
While analyzing Michigan’s strengths, it’s important to consider Wisconsin’s own offensive challenges this season. The Badgers’ offense has underperformed in their first three games, ranking 112th nationally in scoring with just 19 points per game.
What Factors Are Contributing to Wisconsin’s Offensive Woes?
- Inconsistent rushing attack (203.3 yards per game, 33rd nationally)
- Struggling passing game (197 yards per game, 94th nationally)
- Overall lack of offensive production (400.3 total yards per game, 67th nationally)
- 1-2 record with losses to Penn State and Notre Dame
These struggles add an extra layer of complexity to Wisconsin’s preparation for Michigan’s improved defense. Chryst acknowledges that his team will be “challenged differently” against the Wolverines.
The Importance of Defensive Versatility in Modern College Football
Michigan’s defensive improvements under Macdonald highlight a broader trend in college football: the need for defensive versatility. As offenses become more complex and varied, defenses must adapt to multiple threats on a play-by-play basis.
Why Is Defensive Versatility Crucial in Today’s Game?
- Offenses are increasingly using multiple formations and personnel groupings
- Spread concepts have made it necessary to defend the entire field
- Run-pass options (RPOs) require defenders to react quickly to different threats
- The rise of dual-threat quarterbacks demands more adaptable defensive strategies
Michigan’s new defensive approach, as described by Chryst, exemplifies this trend towards versatility and adaptability. The Wolverines’ ability to present “a lot of different looks” and avoid predictability has contributed significantly to their early-season success.
The Battle in the Trenches: Michigan’s Run Game vs. Wisconsin’s Front Seven
One of the most intriguing aspects of the upcoming Michigan-Wisconsin matchup is the clash between Michigan’s potent run game and Wisconsin’s stout run defense. This battle in the trenches could very well determine the outcome of the game.
How Do the Two Units Compare Statistically?
- Michigan’s rushing offense: 290.8 yards per game (5th nationally)
- Wisconsin’s rushing defense: 23.0 yards allowed per game (1st nationally)
- Wisconsin’s yards per rush allowed: 1.01 (1st nationally)
These statistics set the stage for a classic strength-versus-strength matchup. Chryst acknowledges that while Wisconsin has been successful in stopping the run, they can’t afford to focus solely on this aspect of Michigan’s offense.
The Role of Quarterback Play in the Michigan-Wisconsin Matchup
While much attention has been given to Michigan’s run game and defensive improvements, the play of quarterback Cade McNamara could be a crucial factor in the game’s outcome. Despite Michigan’s run-heavy approach, both Chryst and Leonhard recognize the threat posed by McNamara and the Wolverines’ passing attack.
What Has McNamara Shown So Far This Season?
- Efficient passing: 33 of 53 completions (62.3%)
- Solid yardage: 534 passing yards
- Touchdown production: 3 passing touchdowns
- Previous success against Wisconsin: 4 of 7 for 74 yards and a touchdown in 2020
Leonhard’s comments suggest that Wisconsin is preparing for McNamara to play a significant role, especially if the Badgers manage to slow down Michigan’s rushing attack. The ability of Michigan’s offense to maintain balance could be a key factor in the game.
As both teams prepare for this crucial Big Ten matchup, it’s clear that the game will be decided by more than just the headline-grabbing running game battle. Michigan’s defensive improvements, Wisconsin’s offensive struggles, and the potential for big plays in the passing game all add layers of intrigue to what promises to be a compelling contest. With both coaching staffs emphasizing the need for comprehensive game plans, fans can expect a strategic chess match that goes far beyond simple “ground and pound” football.
Wisconsin’s Paul Chryst On Michigan’s ‘Really Fast’ Defense, Run Game, More
Wisconsin’s offense didn’t face much resistance in each of the last two meetings against Michigan, racking up a combined 700 rushing yards and 74 points. And frankly, one of the reasons why Don Brown is Michigan’s former defensive coordinator and Mike Macdonald is now in his first year in charge of the unit is because of those two meetings with the Badgers.
Badgers head coach Paul Chryst isn’t expecting a cakewalk when his team hosts the No. 14-ranked Wolverines this week, though. His offense has struggled through three games, averaging 203.3 rushing yards (33rd nationally), 197 passing yards (94th), 400.3 total yards (67th) and 19 points (112th) per game while posting a 1-2 record, with a win over Eastern Michigan, and losses to Penn State and Notre Dame.
Meanwhile, the Wolverines have been stout, ranking fourth in the country in scoring defense (11 points per game allowed) and 34th in total defense (304. 8 yards).
“Defensively, we’re going to be challenged differently this week, obviously, playing against a really good Michigan team, a team that’s talented and really well-coached and playing really good football right now,” Chryst said.
RELATED: Jim Harbaugh On Michigan Offense’s Rough Patch: ‘It Wasn’t A Cade Thing’
RELATED: Wolverines In The NFL: Brady Surpasses 80,000 Yards, Lewan Bounces Back
Wisconsin Badgers football head coach Paul Chryst is 10-16 against ranked opponents while at UW. (USA TODAY Sports Images)
It’s a lot of the same players as last year, Chryst noted, with the Wolverines having returned seven starters on defense, but they’re playing at a much higher level and are in better positions to succeed. For example, the Wolverines have mixed up fronts and coverages, making it harder for the opposing offense to pinpoint exactly what they’re going to get post-snap. In a word, Michigan has been much more unpredictable on a down-to-down basis.
“Right now, they appear to me to be a team whose defense is playing really fast, which, to me, means they’re confident in what they’re being asked to do,” the seventh-year head coach continued. “I think good defenses do this — they give you a lot of different looks; they’re not just going to stand in one place and make it easy on you.
“But I think they’ve got some really good football players and a good scheme, and I think they’re playing confident and they’re flying around. They’ve got guys that can make plays.”
Wisconsin Not ‘Falling For The Trap’ Of Going ‘All In To Stop The Run’
On the other side, Michigan has been stellar offensively in seven of eight halves of football, with the exception being a scoreless second half against Rutgers last week. The Maize and Blue have put up 40.3 points (16th nationally) and 454.8 yards (33rd) per contest.
“I think they’re a really good offense. I think they’ve got a number of different weapons, and they’re playing well up front,” Chryst said.
Michigan has run the ball on 74 percent of its offensive snaps, simply because it has worked so well. The Wolverines rank fifth in the country with 290.8 rushing yards per game, but they will go up against a Badger front that is yielding just 23. 0 yards per game on the ground and 1.01 yards per attempt, with both numbers by far the lowest in the nation.
Anticipating that his squad will have success at least slowing down Michigan’s run game, Chryst knows it’s not just the rushing attack they’ll have to defend.
“They’ve got enough skilled players that they’re going to make you defend the whole field,” Chryst said. “That’s always the sign of a good offense. Defensively, you’ve got to defend the whole field if you can’t just put your attention on one thing or the other. You’ve got to play it honest, and I think that’s where they do a good job, and I think they’re doing it with good football players.”
Get On The List! Click this image to sign up for breaking Michigan news delivered straight to your inbox!
Wisconsin defensive coordinator Jim Leonhard knows the Badgers must be prepared to make plays down the field as well, opining that Michigan has confidence in redshirt freshman quarterback Cade McNamara, who came off the bench to complete 4 of 7 passes for 74 yards and a 23-yard touchdown against Wisconsin last season, and has connected on 33 of 53 throws for 534 yards and three scores this year.
“The numbers say that they are very committed to the run game,” Leonhard said Monday. “Off of that, they understand you have to do certain things to stop and slow down the run, and they’re going to create one-on-one matchups for the receivers. They like their skill [position players] — they have a talented group of receivers, a talented group of tight ends and as good [a group] of backs as we’ll play this year.
“So it’s not just ground and pound. Obviously, they’ve gotten leads where they’ve been able to commit to it. They haven’t really had to get uncomfortable and put much on the quarterback — that doesn’t mean they can’t or won’t. But it is a lot of vertical shots in the pass game. They’re trying to isolate corners, safeties, DBs down the field, and the scheme is there.
“I’m not falling for the trap that you have to go all in and stop the run because they can’t throw the ball. That narrative is not true. They haven’t had to, yet. They haven’t been forced into situations where they’ve had to get uncomfortable or force a throw or force a pass. “
Making McNamara uncomfortable will be a key for the Badgers, who average 3.3 sacks per game and are the 45th-best pass-rushing team in the land, according to PFF. McNamara has completed 65.9 percent of his passes for 396 yards when kept clean, but has connected on just 44.4 percent of his throws for 138 yards when pressured, per PFF. Pressures have come few and far between, however, with the Wolverines’ pass protectors allowing just nine on McNamara for the season.
“The quarterback did some good things against us last year, obviously made a great touchdown and a couple great throws, I remember, in that game,” Leonhard said. “He’s a talented kid. I know we recruited him throughout the process, so we know what he can do throwing the football.
“I like the way they’re playing their offense right now. They have an identity, they’re playing physical and they’re playing the matchups they want. Whenever you do that, you know you have to put a great plan together to put your guys in position to have success. “
—
• Talk about this article inside The Fort
• Watch our videos and subscribe to our YouTube channel
• Listen and subscribe to our podcast on iTunes
• Learn more about our print and digital publication, The Wolverine
• Sign up for our daily newsletter and breaking news alerts
• Follow us on Twitter: @TheWolverineMag, @Balas_Wolverine, @EJHolland_TW,
@JB_ Wolverine, @Clayton Sayfie and @DrewCHallett
• Like us on Facebook
Washington State’s fast-improving defense to be measured by Oregon State’s ground game
PULLMAN – The most impressive quality of this Washington State defense, according to Jake Dickert, is how quickly it adapted.
“The biggest thing, and I constantly remind people: That last game was Game 9 together – not even a full season in this defense,” said the second-year defensive coordinator, who didn’t get enough time to fully install his system during the coronavirus-impacted 2020 campaign.
When asked to assess WSU’s progressions as a defensive unit, Dickert first commended the group’s mature character, cohesion and dedication. Veteran intangibles were key as they absorbed the former Wyoming DC’s strategies fast, and now find themselves playing their best ball in recent memory.
“I think there’s a belief in our guys that’s really, really strong,” Dickert said after practice Tuesday at Rogers Field. “I think the culture is really, really strong. I think our body language and mentality – even through adversity – is really, really strong. So, I think our leadership has gotten better.
“We’ve got a bunch of guys that want to work hard and do it right.”
Coming off its most convincing showing in four years, WSU’s defense will be measured when it meets Oregon State’s powerful ground game Saturday at Gesa Field.
The Cougars (2-3, 1-2 Pac-12) curbed Cal’s usually productive offense last weekend in Berkeley, holding the Golden Bears to six points – the fewest WSU has surrendered in a Pac-12 game since a 2017 shutout of Colorado.
WSU’s offense went idle late in the game, but its defense never lost bounce after giving up a touchdown on Cal’s first series. The Cougs forced seven punts, limited the Bears’ big plays and quashed a few second-half rumblings of a comeback.
They tallied four sacks and consistently had Cal quarterback Chase Garbers uneasy in his pocket.
“I’d say last week was our most disruptive week,” Dickert said. “Not just sacks. Everyone always looks at the sack category, but to me it’s hits, it’s disruption. Are we moving the pocket? Are we creating confusion up there with the quarterback? How much are we affecting him? It was a great blend and it was great strides we made.”
WSU head coach Nick Rolovich lauded the “collective effort” of the defense throughout the game, crediting Dickert for successfully installing a set of standards that have “been absorbed by the players,” the second-year boss said Monday.
“Their expectation of themselves is high and they played like it,” Rolovich said.
“Defense had quite an impressive performance – how hard they played. (Linebacker) Justus Rogers looked like an inspired player, all the edges made plays. … It was fun to be there in person, but it was also really enjoyable to watch on film.”
WSU dialed up some exotic looks. It appeared to occasionally blitz linebackers and a nickel while pulling edge rushers back into coverage. The Cougs were effective again when they trotted out a four-edge defensive line on passing downs.
Their most productive four-edge set had Ron Stone Jr. and Brennan Jackson – WSU’s starting edge rushers – line up across from guards, while Andrew Edson and Willie Taylor III manned the ends of the line.
Cal converted 3 of 15 third downs. On average, it faced third-and-9.
“You want to get your best guys in (on third-and-long) and we feel like we got four guys that can do it from multiple positions,” Dickert said. “It’s a unique skill set to have R.J. (Stone) and B.J. (Jackson) rush inside, and it’s a whole different feeling for those guards and centers.
“I think we’re athletic enough to drop into coverage and do some different things, probably things that we’ve wanted to get to through the first three or four (games). We didn’t quite use it enough.”
Dickert said he has employed that speed-oriented formation at each of his coaching stops. Pac-12 offenses are slowing the pace more often these days, so he’s been able to send out four edges frequently since taking the job in Pullman.
“A lot of times, with tempo teams, you can’t do it,” he said. “Our league is a little bit more huddle, a little bit more slow now. It allows us to package it a little bit, but we gotta be ready as it continues to be used. Teams will start to change the tempos up.”
WSU will probably need to play with more power than speed when the Beavers come to town. OSU piles up 229.2 rushing yards per game, which ranks first in the Pac-12 and 15th nationally. The Beavers, who also pace the conference in scoring average (36 ppg), bulldozed USC and Washington on the ground with a power game that often flows between the tackles. OSU ran the ball 50 times versus the Huskies.
“We got the No. 1 scoring offense coming and No. 1 rushing team, but I think our defense is in a mindset where that would be something they would not be afraid of,” Rolovich said.
For WSU, the emphasis is to contain the OSU run game on first and second downs, forcing the Beavers to look to their game-manager quarterback in Chance Nolan, who completed 7 of 15 passes for 48 yards last weekend.
OSU leads the Pac-12 in third-down conversion rate at 52% because it typically churns ahead for 4 or 5 yards on early downs.
“They do what they do probably better than anybody, and they’re not apologetic for it,” Dickert said. “It’s old-school, run the ball. Five yards and 5 yards, and you add up a bunch of 5 yards and it equals a lot of first downs.
“It’s football I’m familiar with, but our guys aren’t familiar with it. It’s going to take some physicality. It’s going to take some getting them behind the sticks, getting them into some passing situations. It’s gotta start up front.”
There will be more riding on the shoulders of the Cougs’ defensive tackles. Dickert has been pleased with their technical strides. Senior Amir Mujahid, in particular, has been “really standing out and doing great things,” Dickert said.
He called Tuesday’s session “one of our most physical scout practices we’ve had.”
“Sometimes I had to go, ‘Whoa,’ ” he said. “Our guys understand what it’s going to take to perform well on Saturday, and it’s going to start up front.”
The Cougs have become deft in forcing turnovers – they rank 12th in the nation with 11 takeaways. They are better tacklers in space than in past years and their front has improved its push. They seem to be developing a resilient identity.
WSU’s defense has allowed no more than two touchdowns in three of four FBS games this year. Bolstered by the pass rush, WSU’s secondary held the past two QBs it faced under 200 yards with a combined 51% completion rate.
Cougars defensive backs made multiple one-on-one stops in the open field on checkdown completions against Cal.
“Those guys keep improving,” Dickert said, pointing out George Hicks III for his seamless transition from corner to safety. Senior corner Jaylen Watson registered his first pick of the year and did not allow a reception at Cal, and fellow senior CB Derrick Langford Jr. “had his best game,” Dickert said.
“It was good to see those guys breaking on balls, keeping the ball in front, because that’s an explosive offense. We hit all our goals with (limiting) explosives.”
Linebacker Jahad Woods, the Cougs’ most seasoned player on a defense full of experience, attributes much of the defensive growth to “smoother” communication in Dickert’s 4-2-5 system.
“We don’t need any superheroes, we don’t need anybody making extra plays,” said Woods, who passed WSU great Peyton Pelluer on Saturday for fifth on the Cougars’ all-time tackles list. “We just need everybody to do their job, and once everybody’s on the same page, it works.”
FAST Labs Advanced Technology R&D | BAE Systems
About Us
Defending the United States and supporting its interests worldwide is a relentless task, for which the U. S. Department of Defense (DoD) and U.S. intelligence agencies continually seek new, disruptive defense, aerospace, power, and security technologies. They need technologies that detect, secure against, and respond to threats of every kind, even as they provide options for proactive, offensive measures across a multitude of platforms and scenarios.
As the advanced technology R&D group inside our Electronic Systems sector, BAE Systems’ FAST Labs™ team invents, innovates, adapts, and produces highly-advanced science, electronics, and engineering breakthroughs to provide those technologies. And FAST Labs is well known for its ability to clarify processes, focus resources, and overcome impediments to get those solutions into our customers’ hands more quickly and cleanly than most imagine possible.
In addition to our internal resources, FAST Labs also collaborates with business areas throughout BAE Systems and partners with universities, venture capital firms, and start-ups via our External Tech Scouting unit. FAST Labs even works with competitors if it means identifying, integrating, and delivering the game-changing technologies our clients need at a higher velocity.
Always Innovating
FAST Labs’ history of R&D innovation for U.S. DoD groups includes the Air Force Research Laboratory (AFRL), Army Research Laboratory (ARL), Defense Advanced Research Projects Agency (DARPA), Intelligence Advanced Research Projects Activity (IARPA), and Office of Naval Research (ONR), as well as classified customers. That’s a history built on our own advances and the many R&D teams who have joined BAE Systems over the years, from FADEC Alliance, Fairchild Imaging, Advanced Information Technology, ALPHATECH, Loral Space Systems, and Sanders Associates to Short Brothers Aeroplane Works, Tracor, Lear Astronics, Advanced Power Technologies, Boeing Commercial Electronics, Singer, and STI.
3 Keys to Fast Break Defense
Lacrosse Tip | Tagged:
Defense
Presented by Brian Lalley, Camp Director
Pacific Lutheran University – Boys Lacrosse Overnight & Day Camp
Warm-up.
Xcelerate Nike Lacrosse National Program Director, Brian Lalley, discusses, 3 Keys to Fast Break Defense:
The battle for and against transition should be a big part of any teams practice plan. The game is fast and only getting faster. While our first step should be to limit opponent fast break opportunity as a whole, when they occur, we must be prepared to put the offense in the hardest position to execute.
WHAT IS A FAST BREAK?
A fast break is an offensive transition opportunity where it is four offensive players vs. three defensive players. They generally occur off a face-off, off a turnover and going from defense to offense in a clear or breakout.
IDENTIFY/COMMUNICATE
We practice all sorts of situations on a daily basis. Nothing drives us crazier as a coach that we get it right in practice and then guys deviate on gameday. It should be a very important piece of your transition work to hold your defense accountable to identifying the situation and what each player’s job is.
For a fast break, we want to identify if it’s a righty or lefty break, meaning which side the ball carrier is coming down the field. Next, we need to identify who has point, who has the right pipe and who has the left pipe. We have one less player so we are going to make sure we keep the ball covered when he’s a shooting threat and both pipes covered.
FIRE/ROTATE
When the point player decides the ball carrier is a threat, he should slide to the ball. As the offense moves the ball, the defense moves/rotates as a unit. In the video example attached, watch how the right pipe player slides to the first pass, the left pipe player slides across to cover the adjacent pass and the point defender sinks down the backside.
STICK IN THE LANE/BREAKDOWN RECOVERY
Getting the ball covered will entail leaving one player open and approaching the ball carrier with space. Therefore, having our sticks in the lanes and breaking down through our rotations will be a critical component to forcing the offense into the toughest situations to capitalize.
GO XCELERATE YOUR GAME!
Xcelerate Nike Lacrosse Camps
For more great tips like this one come join us at one of our summer lacrosse camps 2018 to increase your lacrosse knowledge and gain valuable experience. Xcelerate Nike Lacrosse Camp provide players of all positions and skill levels an opportunity to learn from some of the best coaches and players in the game today.
DREDF Opposes Fast Tracking Assisted Suicide
October 7, 2021
On Tuesday, October 5, Governor Newsom signed SB-380 – which shortens the wait time for receiving lethal assisted suicide medication to 48 hours – into law without comment. Previously the period between making two separate requests to take the deadly drugs had been 15 days. The law, which was originally set to expire in 2026, was also extended for five additional years.
With the literal stakes being life and death, already at-risk disability communities don’t have the luxury of staying silent. COVID-19 revealed long standing disparities in our health care delivery systems. Californians – and the nation – witnessed disproportionate rates of infection and mortality throughout communities of color, including disturbing disparities among senior and disability communities.
California should prioritize correcting the inequities in our health care delivery systems, not making it even easier to kill those in already at-risk communities. DREDF has always supported making timely rehabilitative, therapeutic, urgent, palliative or pain management solutions, hospice and related health care options available to all Californians rather than fast-tracking physician-assisted suicide as the state has done.
A recent survey of over 700 practicing physicians across the U.S. found that more than 82 percent self-reported the belief that people with significant disabilities have a worse quality of life than non-disabled people. This context of ableism in medicine informs DREDF’s position on physician-assisted suicide.
Perhaps the greatest danger of weakening already inadequate protections against abuse in assisted suicide is the incremental normalization of the practice. In effect, making the killing of already at-risk individuals and communities more acceptable, and easy enough to do — so commonplace — that no one, except those fighting to stay alive, think twice about or pause to question it.
Contrary to the messaging used by proponents, assisted suicide is no choice at all when aging, disability, and other marginalized communities routinely lack equal access to appropriate, often denied essential medical care and the means we need to live.
Podcast: Vikings offense still adjusting before facing a fast Panthers defense
The Vikings offense has a clear identity whether running back Dalvin Cook or Alexander Mattison starts, but there are adjustments to be made both big and small after five games. Ben Goessling, Andrew Krammer, and Michael Rand discuss coordinator Klint Kubiak’s offense, the left tackle rotation with Rashod Hill and Christian Darrisaw, and more.
If the podcast player does not display on your device, tap here.
Listen and subscribe to the Access Vikings podcast:
Apple Podcasts | Spotify | Google Podcasts |
In Defense of the Most Hated ‘Fast and Furious’ Movie
It’s a widely-held notion that of the eight (soon to be nine) Fast and Furious films, John Singleton’s 2003 installment 2 Fast 2 Furious—the first sequel, following up Rob Cohen’s 2001 original—is the worst. Entertainment Weekly did have the temerity to call “2 Fast” a “forgotten gem,” but every noteworthy ranking declares the sequel the “worst”—an argument that is facile, lazy, and ultimately, incorrect.
I’ll consider doling out some forgiveness for those who found the sequel lacking back in ’03, with The Fast and the Furious stars Vin Diesel, Michelle Rodriguez, Jordana Brewster, and even Ja Rule all missing from the diesel-fueled action. But in hindsight, within the grander scheme of the unlikely saga that has unfurled over the past two decades over nine films and one spin-off, “2 Fast” is not only better than you remember, it also introduces some of the most important elements in the franchise. And yes, it is a better film than the first, especially with Singleton behind the wheel.
The Fast and the Furious is an okay movie with a great concept: “Point Break” with muscle cars. Cohen, a serviceable director of schlock, was inspired by a piece of ethnographic journalism by Ken Li that ran in VIBE Magazine in 1998. Screenwriters Gary Scott Thompson, David Ayer, and Erik Bergquist took Li’s exploration of street racing and laid the undercover-cop-goes-native structure on top.
The illicit world of underground street racing the film introduces is intoxicating, even though it’s populated mostly by men in unfortunate hats and mesh tank tops. It works, but mostly due to a solid cast and the intriguing world it builds. But everything about it is sort of “soundalike,” down to the hip-hop/nu-metal soundtrack and Paul Walker’s Keanu Reeves impression. The chemistry between Walker’s naïf undercover cop Brian O’Connor and Diesel’s muscle car Buddha Dominic Torretto is intriguing enough to make you want more, and the film was an undeniable hit: it made $207 million on a $38 million budget.
For the sequel, screenwriters Gary Scott Thompson, Michael Brandt, and Derek Haas transplanted the action to South Florida, giving the muscle car action a Miami Vice sheen. Diesel turned his nose up at the script and declined to return. But John Singleton, an admitted “The Fast and the Furious” superfan, signed on to direct, bringing with him Tyrese Gibson, the R&B singer Singleton made into a movie star with his 2001 film Baby Boy. With Vin out of the picture, Tyrese fills the void as Roman Pearce, Brian’s buddy from their hometown Barstow. (Ja Rule also turned down 2 Fast, demanding more than the half a mill he was offered, making room for his fellow rapper Ludacris to join the cast in what turned out to be a long-running role as Miami street race impresario Tej, and cementing Ja’s contribution to the franchise as a now-classic meme and nothing more).
Ludacris, Tyrese Gibson, and Paul Walker in 2 Fast 2 Furious, 2003.Everett Collection / Courtesy of Universal Pictures90,000 Fast protection against ransomware and ransomware attacks
- Reading takes 6 minutes
In This Article
Note
This guide will be updated as new information becomes available.
Reducing the risk of ransomware and ransomware attacks is a top priority for organizations because these types of attacks are highly likely to occur and have serious organizational implications.
Ransomware is a ransomware that encrypts files and folders to block access to sensitive files. Criminals use ransomware to extort money from victims. They usually require payment of money in cryptocurrency in exchange for a decryption key. In addition, cybercriminals often use ransomware to extort money from victims in exchange for non-disclosure of sensitive data on the shadow or public Internet.
Although ransomware used to use malware that spreads through phishing or between devices in the past, human-controlled ransomware is now emerging.In this case, a group of attackers, led by the human mind, are targeting an organization, not a single device or set of devices. They use the knowledge of attackers about common errors and vulnerabilities in the configuration of general-purpose systems and security systems to penetrate the organization, navigate the corporate network, and adapt to the environment and its weak points during an attack.
These attacks can be disastrous for business operations. Their consequences are difficult to mitigate, and a complete preemption of the attacker may be required to defend against future attacks.Unlike previous forms of ransomware, which only require malware fixing, human-controlled ransomware will continue to threaten your business after the first attack.
Complexity of ransomware and ransomware attacks
Human-controlled ransomware attacks typically include credential theft and lateral displacement. These attacks can lead to the deployment of ransomware attack code on many valuable resources in order to force the ransom to be paid to the ransomware.The attacker model is often effective and highly adaptive. It can involve the targeted destruction or encryption of backups, network and corporate documents, and other artifacts that allow an organization to rebuild its systems without paying the blackmailers anything.
The attacks also employ sophisticated business models in which attackers set a ransom based on the company’s internal financial records, cyberattacks at the insurance level, and the typical penalties that a company would have to pay for regulatory compliance.
The structure of the recommendations in this decision
This guide provides specific guidance on how to optimally prepare your organization to defend against various forms of ransomware and ransomware attacks.
To help you understand how to protect your organization from a ransomware attack, this guide is organized into stages based on priorities. Each stage corresponds to a separate article. The order of priorities is set to mitigate risk as quickly as possible at each stage, based on an assumption of extreme urgency that goes beyond the usual security and IT priorities to avoid or mitigate these devastating attacks.
It is important to note that this guide is organized into stages by priority, so they should be followed in the order shown. Follow the guidelines below to better tailor this guide to your situation.
Stick to recommended priorities
Use these steps as a starting point to determine in what order to proceed and get the most vulnerable items first. These best practices focus on the application of the suspected attack principle in the Trust No One model, which is designed to minimize business risks by assuming that attackers can successfully gain access to the environment in one or more ways.
Take precautions and be flexible (but don’t miss important tasks)
Review the implementation checklists for all sections of all three stages to determine if there are any areas and tasks that can be completed quickly earlier (for example, you already have access to an unused cloud service that can be quickly and easily configured).When considering the plan as a whole, care must be taken to ensure that scopes and later tasks do not delay for critical areas such as backups and privileged access!
Perform several steps in parallel
You may not be able to do everything at once, but some tasks can naturally be done in parallel. Individuals from different teams can work on tasks at the same time (for example, backup team, endpoint team, identity team), while adhering to the steps in order of priority.
Items in the implementation checklists are listed in order of priority, not in order of technical dependency. They should be used to ensure that the existing configuration is correct for the needs of the organization and to be modified accordingly. For example, in the most important backup item, you may be backing up some systems, but the copies are not offline or can be modified, you have not tested the entire enterprise recovery procedure, or you do not have backups of critical business systems or critical information systems such as Active Directory Domain Services (AD DS) controllers.
Phase 1. Prepare Recovery Plan
This step is designed to reduce the monetary incentive for ransomware attackers in the following ways:
- Significant complication of access to systems, disruption of their operation, as well as encryption or damage to important data of the organization;
- Simplifies an organization’s recovery from a no ransom attack.
Note
While recovering many or all of an enterprise’s systems is challenging, paying an attacker a ransom for a recovery key and then using self-written tools to recover systems and data is a far worse alternative.
Stage 2. Limiting the scope of damage
Make it much more difficult for an attacker to gain access to multiple business-critical systems using privileged access roles. By limiting the ability for an attacker to gain privileged access, it will be much more difficult for an attacker to benefit from an attack on an organization. This will increase the likelihood that the attacker will eventually give up and switch to someone else.
Stage 3. Complicating Access to Your Environment
This last set of objectives is important for creating barriers to penetration, but it may take some time to complete as part of a broader security measure.The goal of this phase is to make it much more difficult for attackers to gain access to on-premises or cloud infrastructures through various typical entry points. There are many such tasks, so at this stage it is important to prioritize your activities depending on how quickly you can complete a particular task with current resources.
While you will be familiar with many of the tasks in this step and / or can complete them quickly and easily, it is important that your actions in step 3 do not slow down the work in steps 1 and 2 .
At a Glance
You can also view an overview of the milestones and their implementation checklists as levels of protection against ransomware in the Protect Your Organization Against Ransomware poster.
Next Step
Start at Stage 1 to prepare your organization to recover from an attack without having to pay a blackmailer.
Additional Resources on Ransomware
Basic Information From Microsoft:
Microsoft 365:
Microsoft 365 Defender:
Microsoft Azure:
Microsoft Cloud App Security:
Microsoft Security Blog Entries:
90,000 Tip of the week: Fastest protection against spam and phishing
February 14 this year falls well on Friday, which means that the celebration of Valentine’s Day will be especially large-scale. It also means that your inbox will be attacked by “heart” advertisements and the imposition of other information of a romantic nature. Very often, various Trojans, phishing links, and other nasty gifts are disguised under the guise of “Valentines”. How to protect yourself? That’s what today’s advice is about.
Spam mailings appear every day in the thousands. To block them, you need at least a couple of hours until specialists detect a threat and add it to the signature database. Advanced heuristic detection methods do not always help.
To protect yourself from malicious messages as quickly as possible, you need to use “cloud” technologies. Cloud protection against spam is based on data received from users around the world through the Kaspersky Security Network (KSN). With the user’s consent, data about attempts to infect a computer, suspicious program activity, etc. are sent to KSN. The received data is processed by an expert system, and information about newly emerging threats and the sources of their distribution becomes available to all users of the product within 40 seconds.
User participation in Kaspersky Security Network allows Kaspersky Lab to quickly collect information about the types and sources of new threats, develop ways to neutralize them, and reduce the number of false positives. Collection, processing and storage of your personal data is not performed. Participation in Kaspersky Security Network is voluntary. You can read more about this technology in our expert’s article on Securelist.com.
To connect to KSN:
1) In the main product window, click on the link Customize .
2) In the left menu, select section Advanced and then on the right Feedback .
3) Press the button Enable :
In addition to the mentioned advantages of using KSN, you can also use the information obtained from the “cloud protection” to analyze applications downloaded from the Internet.
To do this, select the executable file, right-click and select the command Find reputation in KSN from the context menu. You can check executable files, installation packages (msi), command and script files. Cloud Protection is useful for checking recently downloaded or received files that you doubt are safe.
90,000 Medvedev: Russia needs to create a system of fast and effective protection against the threats of new infections – Society
MOSCOW, October 20. / TASS /. The system of protection against the threats of new infections in Russia must be fast and effective. This was stated on Tuesday by the Deputy Chairman of the Security Council of the Russian Federation Dmitry Medvedev at the first meeting of the interdepartmental commission of the Security Council on the creation of a national system of protection against new infections.
“We need to use the existing protection mechanisms and create such a system, on this I want to make a special emphasis that will allow us to quickly, according to a specific algorithm and at the same time effectively defend against new threats,” Medvedev said.
According to him, the experience of combating coronavirus shows that in order to develop effective measures, it is necessary to use broad interdepartmental coordination, therefore, representatives of the government, heads of ministries and departments, employees of the administration of the head of state and the Security Council, as well as experts are included in the new commission of the Security Council.
As noted by Medvedev, the issues of interdepartmental coordination, “despite their seemingly secondary nature,” are really important, because with well-coordinated coordination, decisions reach their goals, while a mismatch makes it difficult to work.
The Deputy Chairman of the Security Council of the Russian Federation reported that a special expert group on scientific and technological issues will be created within the framework of the commission, headed by the aide to the President of the Russian Federation Andrei Fursenko. The group will also contribute to research that should make the prevention, diagnosis and treatment of emerging infectious diseases more effective. The results of the work of the expert group will be reported at meetings of the interdepartmental commission of the Security Council. Speech, according to Medvedev, is about specific decisions regarding new antiviral and antimicrobial drugs, diagnostics and technical means, and in general about “the entire palette of solutions that should help counteract various new infections.”
Commission Task
Medvedev also noted that the tasks of the new body, created recently by the decree of the President of the Russian Federation, Vladimir Putin, are a look into the future and a strategic approach.
“The Commission in no way plans in its activities to replace the activities of other structures such as the Operational Headquarters of the Russian government to counter coronavirus infection or the working group of the State Council on similar topics,” Medvedev emphasized.
“The range of challenges facing humanity, any country, is quite wide and already today requires us to look into the future, use a strategic approach in our work, analyze internal and external threats associated with the emergence of new infections, ensuring systematic monitoring of them proliferation and making the necessary decisions, making proper efforts so that scientific developments in this area turn into effective methods of countering such infections, “said the Deputy Chairman of the Security Council.
“We must not forget that today not only new ones appear, but old ones, sometimes forgotten already, human diseases, diseases of animals, plants are returning, additional foci of the spread of infections are formed, there is a very complex social environment, taking into account the fact that migration flows at the borders are increasing. Russia with the CIS countries and a number of other geopolitical problems that contribute to the spread of new or forgotten old infections, “Medvedev said.
According to the decree of the head of state, the commission is entrusted with the following functions: assessing the threats associated with the spread of infectious diseases, studying the mechanisms of the emergence of new diseases, monitoring the spread of diseases and assessing the state of the collective immunity of the Russian population, its level of protection against new infections, and others.The deputy chairman of the Security Council of the Russian Federation has been entrusted with the task of heading the commission. In total, it includes 23 people.
Location Services | You can allow applications, system services, and websites to collect and use information based on the current location of your Mac to provide various location services. To see which system services are using your location information, click the “Details” button at the bottom of the list on the right.To enable Siri Suggestions and Safari Suggestions to use your Mac’s location, select the Location Suggestions checkbox. Giving applications permission to locate your Mac. |
Contacts | Apps can access your contacts. Applications that have requested access are displayed in the list. |
Calendars | Apps can access your calendars.Applications that have requested access are displayed in the list. |
Reminders | Apps can access your reminders. Applications that have requested access are displayed in the list. |
Photos | Apps can access your photos. Applications that have requested access are displayed in the list. Note. If some items are stored outside of the Photo Library, other applications may be able to access them. |
Camera | Apps can access the camera on a Mac. Applications that have requested access are displayed in the list. |
Microphone | Apps can access the microphone on a Mac. Applications that have requested access are displayed in the list. |
Speech recognition | Apps can access speech recognition on a Mac.Applications that have requested access are displayed in the list. |
Accessibility | Applications can run scripts or system commands to control the Mac. Applications that have requested access are displayed in the list. To add an application, click the Add button, select the application in the list, then click Open. |
Monitor Input | Apps can monitor keyboard, mouse, and trackpad input even when other apps are in use.Applications that have requested access are displayed in the list. To add an application, click the Add button, select the application in the list, then click Open. |
Full Disk Access | Applications can access all files on your computer, including data from other applications (such as Mail, Messages, Safari and Home), data from Time Machine backups and certain administrative settings for all users of your Mac.Applications that have requested access are displayed in the list. To add an application, click the Add button, select the application in the list, then click Open. |
Files and Folders | Applications can access files and folders anywhere on your Mac. Applications that have requested access are displayed in the list. |
Screen Recording | Apps will be able to record your screen.Applications that have requested access are displayed in the list. To add an application, click the Add button, select the application in the list, then click Open. |
Media & Apple Music | Apps can access Apple Music, your music and video activities, and your library on this Mac. Applications that have requested access are displayed in the list. |
HomeKit | Apps can access your home data on this Mac.Applications that have requested access are displayed in the list. |
Bluetooth | Apps can use Bluetooth on this Mac. Applications that have requested access are displayed in the list. To add an application, click the Add button, select the application in the list, then click Open. |
Automation | Apps can access and control other apps on your Mac.Applications that have requested access are displayed in the list. |
Analytics & Improvements | Analytics can be automatically passed to Apple and app developers so they can improve the quality of their work and products.
Ref.See Send analytics to Apple from your Mac and Change Siri preferences. |
Apple Ads | Occasionally, in Apple News, Stocks, and the Mac App Store, you may receive ads based on your interests. To understand why you were shown a particular ad, click the “Advertise” button on the ad. You can turn off personalized ads to prevent Apple from using your information to serve targeted ads.The total number of ads received may not decrease, but the ads may become less relevant to you. To turn off personalized ads, go to System Preferences> Security & Privacy> Privacy, select Apple Ads, and uncheck Personalized Ads. To view Apple’s advertising and privacy policy, click Ads and Privacy. |
Defense does not believe in success – Newspaper Kommersant No. 46 (7008) of 18.03.2021
The lawyers of the defendants in the criminal case on incitement to violation of sanitary and epidemiological norms during an uncoordinated rally in Moscow on January 23 believe that their clients may be under house arrest for up to a year. Thus, the authorities are trying to prevent the opposition from taking part in the autumn elections to the State Duma, as well as to “cool down the protest,” the defenders say. Nevertheless, the pre-election campaign of Lyubov Sobol, who is under arrest, has already started. However, pressure is being exerted on the headquarters volunteers, and Ms. Sobol herself may be denied registration.
On March 17, lawyers for the defendants in the so-called sanitary case held a press conference. The investigation believes that as a result of the calls of the accused to take part in the rally on January 23, people sick with coronavirus took to the street, which created a threat of “mass illness of people through negligence” (part 4 of Art. 33 and Part 1 of Art. 236 UK). Nine defendants are under house arrest in this case: Alexey Navalny’s press secretary Kira Yarmysh, his brother Oleg Navalny, lawyer of the Anti-Corruption Foundation (FBK, included by the Ministry of Justice in the register of foreign agents) Lyubov Sobol, head of Mr. Navalny’s Moscow headquarters Oleg Stepanov, leader of the Alliance of Doctors trade union (included by the Ministry of Justice in the register of foreign agents) Anastasia Vasilyeva; municipal deputies Lucy Stein, Dmitry Baranovsky and Konstantin Yankauskas; and Pussy Riot participant Maria Alekhina.Until March 23, the court banned certain actions to FBK employee Nikolai Lyaskin.
On March 16, the investigation petitioned for an extension of the house arrest for all defendants until June 23. The crime he is charged with is of average gravity, and house arrest is the maximum permissible measure of restraint. Those under house arrest are prohibited from leaving the apartment and using the Internet; they can only communicate with a lawyer, investigator and an employee of the Federal Penitentiary Service. If the conditions are violated, the accused can be transferred to a pre-trial detention center.
Defenders of the arrested oppositionists stated that they consider the case devoid of legal logic, but do not hope for an acquittal.
Lawyer Vladimir Voronin noted that from the point of view of the theory of criminal law, one cannot incite an indefinite circle of persons – “only someone specific”: “If Lyubov Sobol told people with coronavirus: go out, please infect those who are not sick, “It would be like some kind of incitement.”
Maria Alekhina’s lawyer Daniil Berman added that it is impossible to incite to a crime committed by negligence, since such a crime does not provide for intent.Mr. Berman believes that the investigation and trial of the case will be delayed: the investigation has the right to extend house arrest for up to six months during the preliminary investigation and for the same period during the trial.
The purpose of the “sanitary case”, in his words, is “to deactivate the most influential political activists” and “cool down the protest.”
Kira Yarmysh’s lawyer Veronika Polyakova said that the investigation would like to tighten the preventive measure, so they put bracelets on the defendants, and besides, they are constantly monitored by the FSIN officers. Now the defendants comply with the restrictions, but the lawyers of Lyubov Sobol and Maria Alekhina suggested that if the arrest is extended, they will cease to fulfill them.
Let us remind you that Lyubov Sobol is going to run for the State Duma as a self-nominated candidate: she has already published her election program and opened a campaign headquarters. If at the time of the registration of candidates, the politician is still under house arrest, she will still be able to submit documents by power of attorney (this possibility is enshrined in the decision of the Constitutional Court of 2015).However, in order to certify the documents, she will need to personally meet with a notary. Vladimir Voronin told Kommersant that he applied for this to the investigator, but was refused. Mr. Voronin doubts that he will receive it in the future. The court, in his opinion, will not deliver a verdict before the elections, since his client can hardly be given a real term due to mitigating circumstances (a crime of average gravity, committed for the first time, Lyubov Sobol has a minor child).
Mrs. Sobol’s team intends to again apply for admission to her by a notary, Olga Klyuchnikova, head of her campaign headquarters, told Kommersant.
The politician’s team hopes for a favorable outcome and continues its election work within the framework of the plan: volunteers visit the apartments of residents of the Central District, in which Mrs. Sobol is going to run, collect their complaints and, according to the head of the headquarters, meet with the support of the residents. Ms Klyuchnikova also complained that the volunteers were constantly detained by the police and confiscated with leaflets, some were charged with campaigning outside the campaign period (Article 5.10 of the Administrative Code), although elections were not even scheduled.
Political scientist Pavel Salin believes that the authorities are trying to “concrete the political space” closer to the elections to the State Duma and prevent a surge of protest activity. The deactivation of opposition activists, in his opinion, fits into this concept, and therefore the defendants in the “sanitary case” will most likely face an extension of their house arrest, while Sobol will be denied registration.
It would be logical to take advantage of the weakening of Navalny’s team and admit it to the elections, political analyst Mikhail Vinogradov believes: “Without him, his comrades-in-arms are much weaker.But I’m not sure that such a decision will be made. ” He believes that the isolation of the opposition may in no way affect the protest activity, since it is not yet clear “whether there will be an upsurge of protests before the elections and how significant they will be for critics of the authorities.”
Kira Duryagina
NAS SAN DAS storage systems reliable protection and fast access
NAS, SAN, DAS storage systems – reliability, protection and fast access
01.09.2017
The latest storage systems provide faster access to data, while ensuring the reliability and security of their storage.
Direct Attached Storage is a budget-friendly way to solve your disk space needs. Basically, the server gets a personal connection with the storage system and is the only user of it. The advantages of these systems are simplicity and low cost. The only drawback is the limited distance between the server and the storage device.Basically, the storage system is connected to the server via SAS.
NAS is a network-attached storage system that provides its resources over the network in the form of simultaneously used files or directories of the root file system and connects directly to the local network. In this case, the following file access protocols are used: SMB (CIFS) and NFS. Many customers decide to buy this type of storage system, given its obvious advantages:
• This networked storage system allows any distance of storage from clients;
• has additional options: compression of the data array using deduplication, taking storage images, and so on;
• A reasonable price is being formed on the NAS.
SAN storage system provides block access to data sets over the network. In this case, devices can be used not by one server, but by all users of the storage network. Such storage systems involve dividing the disk array into logical blocks that are intended for individual host servers as local resources. SAN systems are highly reliable and tolerant of failure of entire nodes in the storage area network.
In modern conditions, many manufacturers offer up-to-date system solutions for information storage: Fujitsu, Lenovo, Netapp, EMC, Hitachi (HDS data storage systems) and others.LLC “PIRIT” provides various options for data storage systems on the most favorable terms.
Medvedev urged to create a system of rapid protection against new infections
https://ria.ru/20201020/infektsii-1580672843.html
Medvedev urged to create a system of rapid protection against new infections
Medvedev urged to create a system of rapid protection against new infections – RIA Novosti, 20.10.2020
Medvedev called for the creation of a system of rapid protection against new infections
Deputy Chairman of the Security Council of the Russian Federation Dmitry Medvedev stated the need to create a system that will quickly and effectively defend against new threats associated with. .. RIA Novosti, 20.10.2020
2020-10-20T15: 55
2020-10-20T15: 55
2020-10-20T18: 17
Society
Dmitry Medvedev
Health – Society
/ html / head / meta [@ name = ‘og: title’] / @ content
/ html / head / meta [@ name = ‘og: description’] / @ content
https: //cdnn21.img.ria .ru / images / 07e4 / 0a / 14 / 1580707538_0: 0: 3139: 1767_1920x0_80_0_0_1cff78c1caa73cd75930af8085bf1b51.jpg
MOSCOW, October 20 – RIA Novosti. Deputy Chairman of the Security Council of the Russian Federation Dmitry Medvedev said about the need to create a system that will quickly and effectively defend against new threats associated with infections.Medvedev noted that infections and viruses have always been near a person, problems have arisen before, but it is necessary to prepare for this.
RIA Novosti
7 495 645-6601
FSUE MIA Rossiya Segodny
https: //xn--c1acbl2abdlkab1og. xn--p1ai/awards/
2020
RIA Novosti
7 495 645-6601
FSUE MIA “Russia Today”
https: // xn – c1acbl2abdlkab1og.xn – p1ai / awards /
News
ru-RU
https://ria.ru/docs/about/copyright.html
https: //xn--c1acbl2abdlkab1og.xn--p1ai/
RIA Novosti
7 495 645-6601
FSUE MIA Rossiya Segodnya
https: //xn--c1acbl2abdlkab1og.xn--p1ai/awards/
https: // cdnn21 .img.ria.ru / images / 07e4 / 0a / 14 / 1580707538_206: 0: 2937: 2048_1920x0_80_0_0_679b465a675eb143f7027502b1c6849b.jpg
RIA Novosti
7 495 645-6601
FSUE MIA Rossiya Segodnya
https: //xn--c1acbl2abdlkab1og.xn--p1ai/awards/
RIA Novosti
7 495 645-6601
FSUE MIA Rossiya Segodnya
https: //xn--c1acbl2abdlkab1og.xn--p1ai/awards/
society, Dmitry Medvedev, health – society
.