Security through design - reading list

Following my Black Hat USA briefing I had a couple of people approach me asking for reading tips on the topics I covered (human centered design, failure in complex environments, use of checklists - to name a few). Also a good excuse to blow the dust off this old and unused blog.

Here we go:

There’s also tons of stuff on sites like Coursera, like this course.

Any other tips or further questions, just let me know!

 
2
Kudos
 
2
Kudos

Now read this

Should a hacker be a builder instead of a breaker?

It’s one of the certainties in life: when summer approaches and the large hacking conferences such as Black Hat and DEF CON are upon us, the security media starts spinning its wheels. These are the moments when the ‘celebrities’ of our... Continue →