Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Human-Centered Security
Voice+Code
59 episodes
2 months ago
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
RSS
All content for Human-Centered Security is the property of Voice+Code and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Introducing Human-Centered Security: The Book
Human-Centered Security
32 minutes
11 months ago
Introducing Human-Centered Security: The Book

In this episode, Heidi gets a taste of her own medicine and is interviewed by co-host John Robertson about her newly-released book Human-Centered Security: How to Design Systems That Are Both Safe and Usable. We talk about:

  • Why Heidi’s experience as a UX researcher prompted her to write Human-Centered Security.
  • Places in the user journey where security impacts users the most.
  • Why cross-disciplinary collaboration is important—find your security UX allies (people in security, legal, privacy, engineering, product managers, to name a few).
  • Practical security UX tips like secure by default, guiding the user along the safe path, and being really careful about the words you use.
  • Technical users—IT admins, engineers, security analysts—are users, too and why it’s so important to thoughtfully design the security user experience for them. (Spoiler: they help keep the rest of us safe!)


Human-Centered Security
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.