HumanCentered Security, Heidi Trost
HumanCentered Security, Heidi Trost
List: $13.99 | Sale: $9.80
Club: $6.99

Human-Centered Security
How to Design Systems That Are Both Safe and Usable

Author: Heidi Trost, Adam Shostack

Narrator: Simran Singh

Unabridged: 4 hr 6 min

Format: Digital Audiobook Download

Publisher: Ascent Audio

Published: 03/03/2026


Synopsis

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.Human-Centered Security targets professionals designing digital products that handle sensitive data: UX designers, engineers, and product managers. It's also for those responsible for securing organizational data and systems: security engineers, CISOs, CIOs, and teams focused on risk management, legal, privacy, and compliance.These professionals influence security-related behaviors and possess deep knowledge of threats to their products or organizations. This places a significant responsibility on them to design resilient systems that encourage safer outcomes.This book will help you focus on areas of the user experience where security impacts users the most; understand the dynamics of the security ecosystem; find your security UX allies; ask better questions when talking to your cross-disciplinary team; and more.

Reviews

Goodreads review by Brandie on February 22, 2025

This is a must-read for UX designers, researchers, and anyone involved in building secure digital experiences. Instead of blaming users for security failures, this book shifts the focus to designing systems that align with human behavior – not against it. Trost masterfully weaves security insights in......more

Goodreads review by Ria on August 27, 2025

This book, while well intended, was not intended for me. This is a great book for a novice in both UX and security (think 2FA). The descriptions and examples provided were for true beginners (and often times repetitive through each chapter). I found the author heavily relied and referenced others wo......more