Resources

Usable security – Why proving the security of your software does not prove its security

The security world has always focused on proving the security of algorithms and software. The increased use of BYOD and consumer technology in even the most sensitive organisations has shown that you need to do much more than prove the security of your system to achieve true security. This talk explores how we can develop better security systems by making them easier to use.

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Start typing and press enter or the magnifying glass to search

Sign up to our newsletter
Stay in touch with CW

Choosing to join an existing organisation means that you'll need to be approved before your registration is complete. You'll be notified by email when your request has been accepted.

i
Your password must be at least 8 characters long and contain at least 1 uppercase character, 1 lowercase character and at least 1 number.

I would like to subscribe to

Select at least one option*