Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Human-Centered Security
Voice+Code
59 episodes
2 months ago
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
RSS
All content for Human-Centered Security is the property of Voice+Code and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Security Tools Don’t Get a Free Pass When It Comes to Human-Centered Design with Jaron Mink
Human-Centered Security
43 minutes
1 year ago
Security Tools Don’t Get a Free Pass When It Comes to Human-Centered Design with Jaron Mink

In this episode, we talk about: 

  • Security tools don’t get a free pass when it comes to involving end users as part of the design process. 
  • People studying and building ML-based security tools make a lot of assumptions. Instead of wasting time on assumptions, why not learn from security practitioners directly?
  • Businesses (and academia) are investing a great deal in building ML-based security tools. But are those tools actually useful? Are they introducing problems you didn’t anticipate? And even if they are useful, how do you know security practitioners will adopt them?
  • Why are adversarial machine learning defenses outlined in academic research not being put into practice? Jaron outlines three places where there are significant roadblocks: First, there are barriers to developers being aware of these defenses in the first place. Second, developers need to understand how the threats impact their systems. And third, they need to know how to effectively implement the defenses (and, importantly, be incentivized to do so).

Jaron Mink is an Assistant Professor in the School of Computing and Augmented Intelligence at Arizona State University focused on the intersection of usable security, machine learning, and system security. 


In this episode, we highlight two of Jaron’s papers:

  • “Everybody’s Got ML, Tell Me What Else Do You Have”: Practitioners’ Perception of ML-Based Security Tools and Explanations.”
  • “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry
Human-Centered Security
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.