
27 episodes

Human-Centered Security Voice+Code
-
- Technology
-
-
5.0 • 1 Rating
-
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
-
Threat Modeling for UX Designers with Adam Shostack
How can we proactively anticipate threats in effort to design user experiences that are both safe and usable? Adam describes threat modeling and the role UX designers play in threat modeling exercises.
-
Designing Multi-Factor Authentication with Blair Shen and Bethany Sonefeld
Two-factor authentication is often perceived by users as an annoying roadblock placed between them and the goal they want to accomplish. As a UX designer, how do you approach these types of scenarios where you have to balance usability with security?
-
Unintended Consequences: What Questions Should Designers Be Asking? With Bethany Sonefeld
In security we try to anticipate and account for what might go wrong. Thinking more broadly, what are the unintended consequences of the products we put out into the world? What questions should we be asking as product designers?
-
What Role Does the UX Team Play in Security? With Michael Snell
Michael Snell, UX research lead at JPMorgan Chase, describes the role UX designers and researchers play in improving security outcomes. He describes the need for new frameworks for security and privacy in the digital world and explains how to go from security in the abstract to actionable next steps.
-
Testing for Usability and Security with Jeremiah Still
How do you test the usability and security of your design ideas? Jeremiah Still walks us through research he and his team conducted on graphical authentication, where users select system-generated images for their passwords.
-
Technical Users Care About UX, Too
Tanja Venborg Hansen, a user researcher who has worked for an enterprise security company and the aviation industry explains the challenges in creating the user experience for products that are used by information security professionals. We talk about getting buy-in from stakeholders, how to find people to participate in research studies, and deciding what “actionable” data really means.