Access "Secure Reads: Security and Usability"
This article is part of the January 2006 issue of How to stop data leakage
Security and Usability Edited by Lorrie Faith Cranor and Simson Garfinkel O'Reilly, 714 pages, $44.95 @exb Security and Usability @exe It has become fashionable for information security professionals to blame poorly designed user interfaces as the root cause of many security failures. But until now, little has been available outside of academic literature to support these allegations. Security and Usability could create a paradigm shift in its field. Its editors--Lorrie Faith Cranor and Simson Garfinkel, both academically trained computer scientists--have produced a text that explains one of the most important security concepts: Usability issues are inextricably linked to the information system security. Usability and Security introduces infosecurity pros to several new security fields: human-computer interaction, usability design and data privacy. As we move beyond the Stone Age of our profession, only the inflexible or indolent can choose to remain ignorant of these new ways to approach security issues. "The user is the enemy" has now become a cliché of ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...