Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Human-Centered Security
Voice+Code
59 episodes
2 months ago
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
RSS
All content for Human-Centered Security is the property of Voice+Code and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Threat Modeling Parts of the User Journey That Cost Your Business Money With Adam Shostack
Human-Centered Security
47 minutes
1 year ago
Threat Modeling Parts of the User Journey That Cost Your Business Money With Adam Shostack

“Even though usability and security tradeoffs will always be with us, we can get much smarter. Some of the techniques are really simple. For one, write everything down a user needs to do in order to use your app securely. Yeah, keep writing.”


In this episode, we talk about:

  • What is threat modeling and why should product teams and UX designers care about it? (Also check out Adam’s first episode on Human-Centered Security).
  • Focus on parts of the user journey where you might gain or lose customers: what tradeoffs between usability and security are you making here?
  • Involve a cross-disciplinary team from the very beginning. This is critiical: “How do we get focused on the parts of the problem that matter so we don’t spend forever on the wrong stuff?”

Adam Shostack is an expert on threat modeling, having worked at Microsoft and currently running security consultancy Shostack + Associates. He is the author of The New School of Information Security, Threat Modeling: Designing for Security and Threats: What Every Engineer Should Learn From Star Wars. Adam’s YouTube channel has entertaining videos that are also excellent resources for learning about threat modeling.

Human-Centered Security
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.