
Blackhat and Human Factors
BlackHat invites human factors work
BlackHat invites human factors work
BlackHat invites human factors work
Phishing behaviors, as observed in the wild.
Threat Modeling for UX Designers with Adam Shostack on Heidi Trost's podcast
Threat modeling doesn't need to be a slow, heavyweight activity!
The timing of updates is not coincidental.
Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes. I think the workshop was a tremendous success.
[no description provided]
[no description provided]
[no description provided]
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.