Security Cloud Privacy Tech
Easy To Use Tools

Easy To Use Tools

Mornings With Mark no. 0092

Watch the episode on YouTube

Join the discussion on LinkedIn

Share on Twitter

Bad Robot Transcript

Morning, everybody. How you doing today at another day another business hotel room for the night here. I’m giving a talk later on today. And I think I’m going to have to give a more recent episode of hotel room setups in San Francisco webcam footage to talk to you about tooling easy to Langham because two things come across my radar yesterday when I was in front of Congress and I’m talking again about Russian influence does a phenomenal job Arman.

For all sorts of things. I’m not just politics but a lot of sports stuff. They had a great. I woke up tracker Nate silver runs that it’s under the Espionage brella. I think in the listing to a phenomenal job on Alum statistical analysis of influence on Twitter and has a lot of politics there.

I don’t want to call out was it was interesting that they said this year because maybe other people have a different view on it and be able to run a different tools have to see what’s going on and it’s worth a few ideas in my head. Obviously a question of how we have to handle on big data sets for average books for people to pull out information.

So we Cheapest in other areas, but I mean, how would you if I give you three million Tweets in a machine readable format? How would you go about making sense about maybe maybe somebody enterprising would like to or something but most people wouldn’t have an idea of how to process that or how to visualize that and convey that information and I think it’s an area where we need to work on some but in general, but I think it impacts security significantly in fact About handling security data because there’s so much of it.

There’s a massive massive amount of data being generated by a lot of our security to buy a lot of our on tooling around handling data that we don’t know how to properly process it from a machine perspective refer mccune’s respecting. So there’s in the Cloud app on how to how to process this way.

I think it’s a really big challenge. There’s lots of great work out there, but it’s not in the hands of everyday users right now. And I think that’s a huge gap that creates a problem for people to understand cuz you can be presented with certain graphs and things like that.

I was renting the other day at the rotor Reuters these it’s early is it published a chart of the stock of Facebook stock drops and the y-axis was started 170 and went to like 2:30 and so show the precipitous drop when in fact if you look from 0 to 2:40 to drop over.

The big two of the long-term was not that significant and I was a huge but it was not like it was presented that way and I think that’s a real problem. Especially in an error has a believing what you’re talking about. You are talking about that on my CBC call on this week about deepfakes.

It’s hard to believe what you see. So having access to the raw data and ability to process and understand it. I think he’s becoming more and more critical. I’m so wanted to mention that and then the other thing that someone was a trade-off that bit somebody in the bottom so Reddit, how was breached by some accounts got compromised, even though the accounts had two Factor authentication.

So that’s when you have your username and password of them something else to log into something else was a text message and a text message have been compromised and there’s some tweets online where people it said, well, that’s why you don’t use a low-quality second Channel something that’s vulnerable to build something that you need to be secure and that’s it generally positive.

What’s a generally accurate statement of the challenges though is that it’s a question of usability. There is a trade-off to get something when you’re asking more of a user. So username and password password is already frustrate users when you’re asking something else of those users when you’re saying hey, I need you to also use a second Factor you want to make it as simple as possible to tell him to go install another app or use a physical key is a burden that may be challenging to put on people.

So using a text message makes perfect sense and more using apples dialogue system makes perfect sense because it’ll go through security. However, in this case, it didn’t show for admin users a mighty and trust that I T users asking them an additional burden is not unreasonable. But again, it comes down to like I thought that was sort of an interesting balance between having all these data sets and being unable to process and understand them and having something practical like trying to log into a system in a way that doesn’t give you the That you need and of the functionality that you need.

So I just sort of a random thought for today, you know, it’s a couple things that bubble up there. I think overall there’s a huge push and need for better to push you need for better usability. And I think that’s an area where security has an absolutely and utterly mass of blindspot I track and attend as many as I can I use ability conferences have yet to see anything around security and it’s over years of ux conferences and usability conferences.

That’s not good. That’s not good at all because it perpetuates a lot of problems and it makes things harder to use and security should be easy to use a lot of work to do. What do you think? Hit me up online at Mark NCAA if you’re watching the blog in the comments down below or as always, but you know.

Let’s keep the conversation going. I hope you’re set up for a fantastic day today. I will talk to you online and maybe tomorrow we’ll see I’m in transit so I may have to push the show and see you on I will update on Twitter. Morning, everybody. How you doing today at another day another business hotel room for the night here.

I’m giving a talk later on today. And I think I’m going to have to give a more recent episode of hotel room setups in San Francisco webcam footage to talk to you about tooling easy to Langham because two things come across my radar yesterday when I was in front of Congress and I’m talking again about Russian influence does a phenomenal job Arman.

For all sorts of things. I’m not just politics but a lot of sports stuff. They had a great. I woke up tracker Nate silver runs that it’s under the Espionage brella. I think in the listing to a phenomenal job on Alum statistical analysis of influence on Twitter and has a lot of politics there.

I don’t want to call out was it was interesting that they said this year because maybe other people have a different view on it and be able to run a different tools have to see what’s going on and it’s worth a few ideas in my head. Obviously a question of how we have to handle on big data sets for average books for people to pull out information.

So we Cheapest in other areas, but I mean, how would you if I give you three million Tweets in a machine readable format? How would you go about making sense about maybe maybe somebody enterprising would like to or something but most people wouldn’t have an idea of how to process that or how to visualize that and convey that information and I think it’s an area where we need to work on some but in general, but I think it impacts security significantly in fact About handling security data because there’s so much of it.

There’s a massive massive amount of data being generated by a lot of our security to buy a lot of our on tooling around handling data that we don’t know how to properly process it from a machine perspective refer mccune’s respecting. So there’s in the Cloud app on how to how to process this way.

I think it’s a really big challenge. There’s lots of great work out there, but it’s not in the hands of everyday users right now. And I think that’s a huge gap that creates a problem for people to understand cuz you can be presented with certain graphs and things like that.

I was renting the other day at the rotor Reuters these it’s early is it published a chart of the stock of Facebook stock drops and the y-axis was started 170 and went to like 2:30 and so show the precipitous drop when in fact if you look from 0 to 2:40 to drop over.

The big two of the long-term was not that significant and I was a huge but it was not like it was presented that way and I think that’s a real problem. Especially in an error has a believing what you’re talking about. You are talking about that on my CBC call on this week about deepfakes.

It’s hard to believe what you see. So having access to the raw data and ability to process and understand it. I think he’s becoming more and more critical. I’m so wanted to mention that and then the other thing that someone was a trade-off that bit somebody in the bottom so Reddit, how was breached by some accounts got compromised, even though the accounts had two Factor authentication.

So that’s when you have your username and password of them something else to log into something else was a text message and a text message have been compromised and there’s some tweets online where people it said, well, that’s why you don’t use a low-quality second Channel something that’s vulnerable to build something that you need to be secure and that’s it generally positive.

What’s a generally accurate statement of the challenges though is that it’s a question of usability. There is a trade-off to get something when you’re asking more of a user. So username and password password is already frustrate users when you’re asking something else of those users when you’re saying hey, I need you to also use a second Factor you want to make it as simple as possible to tell him to go install another app or use a physical key is a burden that may be challenging to put on people.

So using a text message makes perfect sense and more using apples dialogue system makes perfect sense because it’ll go through security. However, in this case, it didn’t show for admin users a mighty and trust that I T users asking them an additional burden is not unreasonable. But again, it comes down to like I thought that was sort of an interesting balance between having all these data sets and being unable to process and understand them and having something practical like trying to log into a system in a way that doesn’t give you the That you need and of the functionality that you need.

So I just sort of a random thought for today, you know, it’s a couple things that bubble up there. I think overall there’s a huge push and need for better to push you need for better usability. And I think that’s an area where security has an absolutely and utterly mass of blindspot I track and attend as many as I can I use ability conferences have yet to see anything around security and it’s over years of ux conferences and usability conferences.

That’s not good. That’s not good at all because it perpetuates a lot of problems and it makes things harder to use and security should be easy to use a lot of work to do. What do you think? Hit me up online at Mark NCAA if you’re watching the blog in the comments down below or as always, but you know.

Let’s keep the conversation going. I hope you’re set up for a fantastic day today. I will talk to you online and maybe tomorrow we’ll see I’m in transit so I may have to push the show and see you on I will update on Twitter.

More Content