DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. The Changing Landscape of Application Security at Black Hat USA 2016

The Changing Landscape of Application Security at Black Hat USA 2016

Black Hat has always had a reputation as a "hackers" conference, but these days those hackers include thousands of software security professionals from across the globe, along with the biggest names in research and academia, working to protect software and hardware of all types.

Mike Milner user avatar by
Mike Milner
·
Aug. 10, 16 · News
Like (4)
Save
Tweet
Share
2.60K Views

Join the DZone community and get the full member experience.

Join For Free

usa-active.pngThe Black Hat conference has come a long way in the last 19 years. It has always had a reputation as a "hackers" conference, but these days those hackers include thousands of software security professionals from across the globe, along with the biggest names in research and academia, working to protect software and hardware of all types.

The event drew a record-breaking crowd of 15,000 this year, and, not surprisingly, application security was on the minds of many. In past years, the discussion around application security was focused primarily on coding vulnerabilities. But with the embrace of the cloud and the increasing emphasis in many organizations on building and deploying web applications, the focus is shifting to runtime threats, such as Account Takeover attacks.

Stolen credentials, web shells, backdoors, SQL injections -- all of these have been on the rise in 2016, according to experts including the researchers at Verizon. We also saw some innovative attack vectors exploiting some new functionality in web standards that are actually designed to make the web safer. So the question facing many at Black Hat was: how are application security technologies evolving to keep up with these threats?

I of course had many conversations about Runtime Application Self Protection (RASP). Most large organizations have immense portfolios of applications and are looking for technology that can deploy easily across many different platforms to provide consistent monitoring and protection across all their apps. Many companies are currently running trials or looking to start a trial shortly.

Other Black Hat trends and discussions of note included:

  • Increasing maturity in machine learning and artificial intelligence technologies on exhibit; this market segment is developing into something more than a fad
  • Yet another large list of bypasses for popular Web Application Firewalls
  • Lots of talk about mobile application development, including a look at OAuth and related trends in user authentication
  • More car hacking in various forms
  • A look at vulnerabilities stemming from weakened cryptography
  • An examination of the latest phishing tactics and ways organizations can evolve training to keep employees and other users from becoming victims.
mobile app Application security security Landscape (software)

Published at DZone with permission of Mike Milner, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • The Real Democratization of AI, and Why It Has to Be Closely Monitored
  • Uplevel Your Managers With Mini-M Support Groups
  • Apache Kafka Introduction, Installation, and Implementation Using .NET Core 6
  • Data Engineering Trends for 2023

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: