You've requested...

Housing Association Puts Staff into the Community, Increasing Personal Contact

If a new window did not open, click here to view this asset.

Download this next:

Mobile Payments Using Host Card Emulation with NFC

Smartphones with NFC capabilities are gradually becoming one of the preferred methods – ahead of credit cards – for contactless payments. However, unlike payment cards, smartphones are an easier target for hackers.

This raises concerns over security threats and data privacy issues – particularly when the token is stored on a smartphone – and when such data is communicated through less secure networks such as the internet.

In this article, we look at the risks associated with using smartphones for contactless payment transactions.

These are also closely related to: "Housing Association Puts Staff into the Community, Increasing Personal Contact"

  • Streamline municipal services with cloud-based contact centers

    Municipalities today must manage non-emergency services efficiently while meeting community expectations. InterVision's ConnectIV CX for Community Engagement provides a cloud-based contact center platform tailored for city and county governments.

    The solution enhances operations, optimizes resources, and cuts costs with AI automation, real-time data, and omnichannel engagement. It enables municipalities to understand community needs and improve resident satisfaction with a more responsive service experience.

    Discover how ConnectIV CX can revolutionize your municipal service delivery in the full white paper.

  • GAIA-X: Current Status and Outlook – What to Expect and How to Engage

    The key objectives of GAIA-X, Community Engagement and participation via the GAIA-X Association. European Data Infrastructure as part of NextGenerationEU - based on GAIA-X.

Find more content like what you just read:

  • Open Data In The Water Industry: A Case for Change

    Open data can enable water companies to create value for water customers, communities and the environment. It can be used to help address some of the challenges that the water industry faces. Anita will talk about Ofwat’s H2Open publication and why open data is so important to the sector right now. She’ll cover: The opportunities presented by open data Discuss the enablers and challenges associated with open data, and; Shine a light on some of the activities already underway in the industry.

    Download

  • Navigating the New Normal for Call Centers

    McIntosh & Associates, one of the leading call center consulting firms, joins Kelly Zunker from Cyara to explore ways to successfully navigate some of the most sophisticated issues facing today’s contact centers, including managing at-home agents to ensure a quality customer experience.

    Download

  • It’s Been Ten Years. Why has nothing changed?

    Join us for a candid discussion on why we continue to see a shortage of skilled Cyber professional and how it is fast becoming one of the least understood problems faced by businesses and the profession today. Based on the latest research paper The Life and Times of Cybersecurity Professionals 2019. A Cooperative Research Project by Enterprise Strategic Group and the International Systems Security Association (ISSA), Jim Reavis and Candy Alexander, two of our prominent leaders in the community, discuss why it was so important to forge the alliance between ISSA and CSA and how to best tackle the problem at hand.

    Download

  • AWS Paper: Promoting Population Health With Data

    There are many challenges facing healthcare providers who are aiming to promote population health for their communities. In this AWS white paper, learn how to harness complex data on multiple determinants of health to inform clinical and community intervention – and much more.

    Download

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

    Download

  • State of data science: AI takes center stage

    This in-depth report examines the state of the global data science community, including insights on generative AI, open-source software, and delivering business value. Get the full report now to explore the latest trends shaping the future of data science.

    Download

  • Topcon World Glaucoma Symposium

    We are pleased to announce that the World Glaucoma Association launched the Global Webinar series, offering free high-quality education to the entire glaucoma community. The purpose of this new initiative is to bring the entire glaucoma network together, facilitating the exchange of scientific knowledge and expertise.

    Download

  • How Remote Health Could Usher In a New Era In Care

    During this Cityfi Webinar Series, sponsored by Verizon and hosted by BlueJeans, we will explore the benefits of telehealth and how equitable application of technology can impact community resilience in the face of COVID-19—and other threats to health and wellness. Featuring: Cathy Lester, Verizon Gabe Klein, Cityfi Dr. Pierre Vigilance, Population health advisor; former Associate Dean for Practice at the George Washington University, School of Public Health; and former health official in Baltimore, MD and D.C. Dr. Yolandra Hancock, Board-certified pediatrician and obesity medicine specialist

    Download

  • Bringing Open Source to z/OS

    Organizations are modernizing their z/OS technology and their workforce as much to reduce costs as to build new advanced capabilities. Most are using open-source software (OSS) in their modernization initiatives but are quickly realizing the hidden cost and risk associated with adopting community tools that are not commercially supported. Join Dominic Martin & Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z.

    Download

  • Bringing Open Source to z/OS

    Organizations are modernizing their z/OS technology and their workforce as much to reduce costs as to build new advanced capabilities. Most are using open-source software (OSS) in their modernization initiatives but are quickly realizing the hidden cost and risk associated with adopting community tools that are not commercially supported. Join Dominic Martin & Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z.

    Download

  • Balance Speed with Assurance to Bring Open Source to z/OS

    Organizations are modernizing their z/OS technology and their workforce as much to reduce costs as to build new advanced capabilities. Most are using open-source software (OSS) in their modernization initiatives but are quickly realizing the hidden cost and risk associated with adopting community tools that are not commercially supported. Join Peter Fandel as he takes a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z.

    Download

  • Balance Speed with Assurance to Bring Open Source to z/OS

    Organizations are modernizing their z/OS technology and their workforce as much to reduce costs as to build new advanced capabilities. Most are using open-source software (OSS) in their modernization initiatives but are quickly realizing the hidden cost and risk associated with adopting community tools that are not commercially supported. Join Peter Fandel as he takes a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z.

    Download

  • Balance Speed with Assurance to Bring Open Source to z/OS

    Organizations are modernizing their z/OS technology and their workforce as much to reduce costs as to build new advanced capabilities. Most are using open-source software (OSS) in their modernization initiatives but are quickly realizing the hidden cost and risk associated with adopting community tools that are not commercially supported. Join Peter Fandel as he takes a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z.

    Download

  • Bringing Open Source to z/OS

    Organizations are modernizing their z/OS technology and their workforce as much to reduce costs as to build new advanced capabilities. Most are using open-source software (OSS) in their modernization initiatives but are quickly realizing the hidden cost and risk associated with adopting community tools that are not commercially supported. Join Dominic Martin & Peter Fandel as they take a deeper look at the value proposition associated with using commercially supported OSS in mission-critical environments, like IBM Z.

    Download

  • A Computer Weekly E-Guide on Wired and Wireless LAN

    When looking the way in which the Covid-19 pandemic has changed business life, a number of key areas have come to the fore: SD WAN, SASE and in particular digital transformation are key examples of that. Yet very little of the discourse includes something that is still really at the heart of the vast majority of firms: The local area network (LAN).

    Download

  • Chapter Chat: Executing Robust Chapter Programs

    Learn how the (ISC)2 Quad Cities Chapter partnered with colleges and other nonprofit associations to produce an annual cybersecurity conference, Kid’s STEM/Cybersecurity Camps, as well as host monthly Cybersocials. They have been able to reach hundreds of people in the local community with a goal of hitting 1,000 this year!

    Download

  • Modern Kill Chains: Real World SaaS Attacks and Mitigation Strategies

    The ubiquitous use of SaaS products has fundamentally changed the modern organization's attack surface. Organizations have moved critical business processes to SaaS tenants in search of agility, scalability and efficiency. In many cases, appropriate security controls have not followed. Attackers understand this change in attack surface and are increasingly taking advantage of the opportunity by targeting and breaching organizational SaaS tenants. This talk will primarily focus on novel research of threat actor activity on one of the largest collections of disparate SaaS log data in the world. The presenter will detail a variety of real world SaaS tenant attacks observed in the wild by known and unknown threat actors and discuss associated TTPs and IoCs. In addition to attack research data, we'll provide historical context to understand how we've arrived in this situation and propose mitigation strategies to protect organizations from these attacks.

    Download

  • Protect your remote workers from BEC attacks

    Organizations are having less face-to-face contact and are more dependent on virtual communications and mobile devices, creating a perfect attack vector for bad actors to exploit the new workspace using sophisticated tactics. The consequences of not having the right email security strategy in place can cost organizations of all sizes millions of dollars. Topics covered: • How to secure your business against email-based threats • How automation removes the errors and friction associated with manual S/MIME deployment • How to deploy digitally signed and encrypted email at-scale in minutes • How to stay in front of your compliance obligations

    Download

  • Allyship: Changing the “it’s not my issue” Mindset

    Every community needs allies and we will all at some point need to take on that stance if we’re to strive for a truly inclusion and equal society. To create more active allies, we need to dispel the belief that challenges only concern the community facing them and our panel of speakers share their experiences and advice for engaging the people around us.

    Download

  • India gears up for 5G but challenges remain

    India's upcoming spectrum auction marks the start of larger-scale deployments of 5G in the subcontinent, but telcos will need to find a way to address high infrastructure costs and monetise their investments. Download the full article to understand what challenges the country will have to face on its journey to deploy 5G.

    Download

  • Cybersecurity for Community Banks and Credit Unions

    This paper explores how Akamai Guardicore Segmentation addresses the specific needs of community financial institutions. It highlights real-world applications, showing how these institutions can enhance their security posture, comply with regulations, and streamline operations.

    Download

  • ICS stories: Integrated care in Humber, Coast and Vale ICS

    The Integrated Care Centre serves Hull and the East Riding of Yorkshire. The clinical leaders have worked collaboratively with the CCG and health and social care providers to deliver a new and award-winning anticipatory and responsive community frailty model. This webinar will cover the system's approach to change management and cultural challenges; the financial model and associated risks; as well as lessons learned and next steps.

    Download

  • The development of wired and wireless LANs in a hybrid work model

    Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).

    Download

  • Food Donation Tech Platform Feeds Millions

    A tech-enabled platform facilitates food donations by connecting organizations with surplus food to communities facing food insecurity.

    Download

  • Making Cybersecurity Personal

    Bring the human aspect of cyber safety to your business, local schools and community with the latest Garfield program and other new, engaging educational opportunities from the Center for Cyber Safety and Education. As cybersecurity experts, you know the dangers our current and future generations are facing online. This is your chance to feel good and make an impact in your community. Join the conversation and get involved.

    Download

  • 5G vs. Wi-Fi 6: What's the difference?

    While several differences between Wi-Fi 6 and 5G exist, the two technologies can be a powerful combination for organizations that are looking for reliability and flexibility when building their network. In this infographic, we dive into the main differences, pros and cons of these two technologies.

    Download

  • The 5G for Business Guidebook

    Besides being able to download Netflix movies faster, should you really care about 5G? Download this e-guide to learn about the basics of 5G, how it differs from 4G, why you should care and how to find the best 5G fit for your organization.

    Download

  • The Balancing Act: Security vs. Budget in Community Banking

    Community banks are the lifeblood of local economies, but they often face unique challenges, especially when it comes to juggling extensive compliance regulations with limited resources. Spend 15 minutes with Adlumin's Vice President, Chief of Strategy, Mark Sangster, and Executive Vice President & Chief Innovation Officer, ICBA Innovation, Charles Potts, to gain the knowledge and tools to protect your bank and your community!

    Download

  • [On demand] Protecting Networks and Applications As A Managed Security Service

    Managed security service providers (MSSPs) who sell managed security services to their enterprise customers and tenants continue to evolve these security services to meet the complex requirements associated with threat mitigation in a multi-cloud and hybrid environment. To be successful as a business, MSSPs must strike a delicate balance between providing scalable and cost-effective security services, overcoming cost and operational challenges, and differentiation with an innovative security portfolio without impacting the quality-of-service experience (QoE.) This webinar will document and provide open discussion on how MSSPs are navigating this evolving landscape. Topics to be discussed include: - The security impacts of the evolving threat landscape - The challenges of protecting networks and applications in a multi-cloud, multi-tenant environment - Key use cases for protecting networks and applications for carriers and service providers - How to enable network and application security services quickly and cost-effectively

    Download

  • Scary DR Stories: Disasters to scare the IT out of you

    We have consulted the oracles and read the portents to unearth the most frightening stories submitted by you, our community. Watch Zerto’s Scary DR Stories webinar to hear first-hand recounts of the most terrifying DR events the industry has seen. Presenters include: Angela Montgomery, Secure-Net Solutions, Systems Administrator Trevor Doyle, Midwest Bank, VP of Information Technology Neal Potter, Arrowstreet Capital, Associate, IT Operations Hosted by Ryan Siegel

    Download

  • Cloud Security Engineering: Applied Threat Modeling

    In this workshop, participants will learn how to apply threat modeling concepts to cloud-native application architectures to expose attack surfaces. Our case study will be a cloud-native SaaS, multi-tenant application running in AWS. We will be applying attack methodologies from the open source community and attack libraries from Mitre (e.g., ATT&CK, CAPEC), as well as from the Common Architectural Weaknesses and Exposures (CAWE) taxonomy. Participants will each produce a working threat model. We will use publically available tools for the threat modeling exercise to uncover application design defects that can be exploited. Our goal is to understand how cloud-native applications work holistically and to dive deep into topics such as: container orchestration; micro services; advanced authentication; secrets management; and data processing risks. Learning objectives: 1. Demonstrate advanced threat modeling skills that are necessary to analyze cloud-native applications. 2. Define the attack surface for a SaaS multi-tenant application. 3. Conduct advanced attack simulations on a cloud-native architecture to validate findings and remediation efforts.

    Download

  • The Cybersecurity Landscape in 2021 by Forrester

    Forrester's network security analyst, David Holmes, shares how the security community has stepped up and stepped in to the cybersecurity challenge created by the pandemic and associated lockdowns. Trends that were embryonic in 2019 are riding a wave of scalability into completely changing how workers work, consumers consume and security practitioners secure. In this wide-ranging keynote, Holmes will cover CISO's top concerns, privacy vs security, and introduce the new Zero Trust Edge for network security and SASE environments.

    Download

  • What junior IP pros want: a guide to keeping talent happy

    WIPR delves into what makes future IP leaders tick with this free webinar. Our three-strong panel head-up communities that represent thousands of junior IP professionals at the INTA, AIPLA and AIJA. In this hour-long discussion, we'll dig into what motivates, attracts, and turns off trainees and solicitors at the early stages of their career. -What does work / life balance mean to Gen Z? -How important is money over career progression? -What makes talent want to stay or leave? Featuring: - Chloe Taylor, Co-chair of the International Association of Young Lawyers Intellectual Property, Technology, Media, and Telecommunications Commission - David Diamond, Chair of INTA's Young Practitioners Committee - Christina Yang, Chair of the American Intellectual Property Law Association's New Lawyers Committee

    Download

  • 5G business use cases

    5G, the latest generation of cellular technology, delivers faster speeds, lower latency and greater capacity for multiple devices than its 4G predecessor. Although carriers are devoting the lion's share of their 5G marketing dollars to wooing consumers, enterprises will reap the biggest rewards. Here are seven 5G emerging use cases for enterprises.

    Download

  • Uniting Communities for Rare Disease Clinical Trial Success

    Step into the realm of innovation and collaboration in patient recruitment and retention with our upcoming webinar, "Bridging Boundaries: Uniting Communities for Rare Disease Clinical Trial Success." Delve deep into the multifaceted landscape of patient engagement, recruitment, and retention challenges and solutions, with a particular focus on the rare disease DADA2. Explore how the synergy between community engagement, trust-building, and interconnected networks among physicians and patients holds the key to unlocking the full potential of clinical trials. Discover actionable insights and transformative strategies that can redefine the trajectory of clinical trial success in rare diseases. Speakers Kate Shaw - Founder & CEO, Innovative Trials Leanne Woehlke - Director, Life Sciences Solutions, TransPerfect Will Krugman - Marketing & Communications Director, Clinical Research Associates Chip Chambers - Founder & President, DADA2 Foundation

    Download

  • Make Digital Cities a Reality with Dell Technologies & Boomi

    As cities move to embrace smart city technologies and Internet of Things (IoT) solutions, they need to understand the new data challenges associated with these projects. In this webcast, we’ll explore the drivers and reasons to implement a Smart City Data strategy and architecture for tangible city and community improvements, not just a science experiment. We will review the challenges and how some cities are preparing to manage the data coming from sensors and IoT devices, as well as review how the Boomi platform and Dell EMC infrastructure supports smart city solutions.

    Download

  • How the Peel Regional Police Found the Right Authentication Solution for Them

    The Peel Regional Police (PRP) team is the third largest municipal police service in Canada with 2,100 uniformed members and close to 875 support staff. Composed of five major divisions supported by community police stations, the team is responsible for a broad range of policing duties from airport security and traffic to community-related services and improving community safety and well-being. With such a broad range of environments and systems, the stakes are high when it comes to authentication. Join the Peel Regional Police and Axiad on December 8th to learn: - The authentication challenges they face—and how yours might compare - The tipping point that meant they needed to transition - Their selection criteria and best practices for finding a new approach - Why they selected Axiad as their vendor of choice - The challenges they foresee for the future

    Download

  • Build a Winning Strategy for Your Storage-as-a-Service Business Model

    According to our Cloud Storage Index Report, 90% of organizations anticipate increasing their cloud storage capacity this year. Discover how managed service providers are enabling their customers to embrace the cloud as they adopt new technologies like IoT and AI and modernize tools for remote collaboration, building a storage-as-a-service business built to scale growing data needs. Join us on another next episode of Spicy Service Providers, where we gain insights into how Sherweb leverages a multi-tenant cloud architecture to grow their business. From understanding the average cost per customer or fees associated with accessing stored data, lack of visibility continues to grow as a concern for adopting cloud storage. Managed service providers are needed now more than ever to help organizations understand what is happening in cloud environments and drive growth over waste. No organization is the same, with IT requirements and initiatives constantly evolving. By demonstrating expertise in cloud economics and helping clients navigate the complexities of multiple IT environments, MSPs can position themselves as trusted advisors and strategic partners in their clients’ digital transformation journey. We will dive into Sherweb’s successes and insights into understanding multi-tenant cloud architecture and how it’s essential for MSPs to effectively serve their clients and stay ahead of an ever-evolving technology landscape. What you will learn: - Understanding Multi-tenancy in cloud computing - Challenges with building a multi-tenant cloud architecture - Simplifying multi-tenant cloud architecture with Wasabi Account Control Manager - Best practices in building your storage-as-service business model Speakers: Guy Sauve, Sherweb Jonathan Chaput, Sherweb Shannon Lynch, Industry Marketing Manager, Wasabi Technologies

    Download

  • 5 questions to ensure a future-ready retail pharmacy

    The changes happening to today’s retail pharmacy landscape are undeniable, and while dispensing medication safely and efficiently may still be at the core of what these pharmacies do, this line of business alone won’t keep them profitable in the long run. Take the first step towards creating a future-ready retail pharmacy by opening this eBook.

    Download

  • Exclusive offers boost customer loyalty in uncertain times

    Exclusive offers build lasting customer loyalty, especially in economic uncertainty. This research shows how community-based deals drive emotional connections, increase loyalty program membership, and inspire customers to share offers. Read the full report to learn how your brand can acquire and retain customers through economic ups and downs.

    Download

  • Office sector headwinds and opportunities

    Office landlords have been heavily impacted by the pandemic and now face uncertainty as tenants evaluate their needs in hybrid working environments. Senior Analyst Alec Overby reviews the current state of the sector, including the changing work-from-home landscape, our outlook over the near and long term, as well as how we see valuations and potential for opportunity.

    Download

  • Brexit and UK tech: Essential guide

    In the immediate aftermath of the UK's historic referendum vote to leave the European Union, Computer Weekly canvassed the advice and opinion of experts across the technology sector to assess the implications for IT professionals.

    Download

  • Threat Intelligence Leads to Intelligent Defense

    The business landscape has changed dramatically over the last decade, and the modern workplace is almost unrecognizable compared to what came before. SaaS applications, mobile connectivity and remote working have eroded the effectiveness of traditional moat and wall approaches to perimeter defense, while changes in attacker behavior have exploited the gaps left by this shift. In this webinar presented by IT Pro in association with Cloudflare, reviews and community editor Adam Shepherd sits down with Cloudflare CTO John Graham-Cumming to find out why the new network perimeter is so different, and how organizations can utilize cutting-edge cloud technologies to stay ahead of the curve.

    Download

  • Next Gen Now - Changing your charity structure, 10 Feb

    Julie Hutchison of the abrdn Charities Investment Team invites you to join her for our latest webinar which builds on the Next Gen webinar in 2021 which looked at different types of legal structures used by charities. Using three case studies, it will cover some of the practicalities involved in implementing a change of structure, including the scenario where a non-charitable body (a community interest company or CIC) changes its structure to become a charity. Julie will be joined by Chris Knight, Partner at VWV and Debbie McIlwraith Cameron, Associate at Turcan Connell. This webinar includes a live Q&A with the panel.

    Download

  • OCTO TUNEUP - Trust in Bonds

    Here Lee Robertson, Founder of OCTO asks OCTO Members questions to Mark Green & Mark Lambert of HSBC about Deeds of Variation and the associated issues. At Octo, we invite you to Connect. Share. Engage. Join us to meet thousands of fund managers, advisers, consultants, marketers and paraplanners like you who are connecting in a trusted peer-to-peer community around topics like Advice, Economics, Practice Development, Portfolio Construction, Investments, Regulation … and much more! Join OCTO Now https://octomembers.co The entire TuneUp Series qualifies for CPD which is accessible as an OCTO Member.

    Download

  • Top 5 Use Cases for Threat Intelligence Platforms (TIP)

    This Lunch-and-Learn webinar will highlight the key use cases for a modern Threat Intelligence Platform (TIP) and show live demonstrations of how Cyware’s platform provides end-to-end coverage. These use cases include: • Ingestion of structured and unstructured threat intel, • Enriching threat intel, both manually and automatically (associating known vulnerabilities), • Supporting threat hunting operations, • Deploying countermeasures and simplifying integrations, • Threat intelligence sharing with internal and external communities. Qualified attendees who schedule a follow-up demo will receive a $25 Uber Eats voucher.

    Download

  • Next Generation SaaS: Building Scalable, Multi-Tenant SaaS Solutions on AWS

    Whether you’re migrating single-tenant environments or modernizing an existing SaaS solution to obtain the benefits of AWS cloud native solutions, launching, and running a SaaS platform can be complex and costly. Many SaaS platforms are adopting a microservices approach to application development and leveraging automation, scalability and flexibility in order to enhance the customer experience and accelerate innovation. AWS has resources and tools for you at every stage of your product journey – from concept to QA to production. Join Chris O’Malley, Sr. Practice Manager, Cloud Native Development at Rackspace Technology, Anubhav Sharma, Sr. Partner Solutions Architect, SaaS Factory at AWS, and Oded Rosenmann, SaaS Business Lead at AWS as they explore the advantages of multi-tenancy and dive deep into a range of migration and modernization approaches on AWS, highlighting the unique challenges, advantages, and demands of each approach. What we’ll cover: - Business drivers for adopting a cloud native SaaS model - Challenges and strategies associated with building next-generation SaaS applications - Approaches to transitioning to multi-tenant environments including data segregation & resource management - Considerations for billing and metering your environment for optimal tenant usage - Architecting for scale and deploying production-ready SaaS using AWS Managed Services - Real-world use cases of implementing scalable SaaS platforms on AWS

    Download