HackDig : Dig high-quality web security articles for hacker

‘Wicked’ Problems in Information Security

Incorporating security activities into the natural workflow of productive tasks makes it easier for people to adopt new technologies and ways of working, but it’s not necessarily enough to guarantee that you’ll be able to solve a particular security-usability issue. The reason for this is that such problems can be categorised as wicked.Rittel and Webber in ‘
Publish At:2016-08-22 14:25 | Read:4965 | Comments:0 | Tags:Featured Articles Design problem security solution usability

Security and Usability

Many employees find information security secondary to their normal day-to-day work, often leaving their organisation vulnerable to cyber attacks, particularly if they are stressed or tired.When users perform tasks that comply with their own mental models (i.e. the way that they view the world and how they expect it to work), the activities present less of a
Publish At:2016-08-16 12:00 | Read:3587 | Comments:0 | Tags:Featured Articles Design John Maeda security The Laws of Sim

Crypto in the box, stone age edition

IntroductionFirst of all, Happy New Year to everyone! I hope 2016 will be a fantastic and healthy year, filled with fun, joy, energy, and lots of pleasant surprises.I remember when all of my data would fit on a single floppy disk. 10 times. The first laptops looked like (and felt like) mainframes on wheels and the ent
Publish At:2016-01-06 19:30 | Read:2898 | Comments:0 | Tags:001_Security Crypto boxcryptor container crypto encryption i

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud