October 22nd, 2012
Least privilege security and application whitelisting are all about protecting systems from unwanted change, but are also critical when it comes to protecting users’ credentials and domain admin passwords. While preventing key logging software from getting onto your systems is the most evident way these defenses might stop account credentials from being compromised, there are some less obvious advantages too.
- January 16th, 2017
It’s often said that you can either have security or you can have usability, but you can’t have both. Before I worked for a security company I believed this accepted wisdom without question – security was going to be something frustrating and annoying that would get added to my design at some point.
- December 1st, 2016
Lola Oyelayo was formerly Director of Strategy & User Experience at Head, and a few weeks ago I was lucky enough to see her excellent talk on Wicked Problems at NUX5. I was even luckier to have the opportunity to chat to her the evening before about how designers can tackle complex problems in digital projects.
- August 15th, 2016
All around the world – across industries, technologies, and in organisations of every size — user experience has never been more prominent. There are more people working in the field, more resources dedicated to understanding humans and designing for them, and more focus on how products and services are making people feel.
- July 22nd, 2016
Somewhere, in most organizations’ bug-tracking system, there’s a dark corner. It’s a place where – at best – people go to have an opinionated argument. At worst, it’s a place that bugs go to die. It’s the usability bug receptacle.
- July 11th, 2016
A few weeks ago, I happened to listen to a radio programme on how punctuation came to exist. This remarkably interesting half hour revealed to me how something that we now see as finished, complete, and solid is in fact the result of invention, evolution, and technical advance.