Security Then and Now

Null Charcha

2022/06/11

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This is the first episode of Null Charcha, a panel discussion featuring Anant Shrivastava and Prashant discussing “Security Then and Now” - comparing security practices from 10+ years ago to the present day.

Panelists

Key Topics Discussed

Security Then vs Now:

2000-2010 Era:

2010-2022 Era:

Entry Paths:

Tools and Automation:

Scanners:

Manual Testing:

Bad Actors:

Evolution:

Defense Evolving:

Logging and Monitoring:

Logging:

Monitoring:

Mindset Change:

Defensive Evolution:

Frameworks:

OS Level:

Automation:

Broken Access Control:

Why Always There:

Amalgamation:

Funny Vulnerability Stories:

Prashant’s Story:

Anant’s Stories:

Other Stories:

Open Source:

Evolution:

Open Source Term:

Open Source in Corporate:

SBOM (Software Bill of Materials):

SBOM Effectiveness:

Operating Systems:

OS Does Not Define Hacker:

Scenarios:

Blurring Boundaries:

Security Research:

Term:

Research Difficulty:

Research Then vs Now:

Quality Research:

Example:

Advice for Quality Research:

Future of Security:

Web3:

Blockchain:

Metaverse:

Web3 Security:

Web2 Attack Patterns:

Desktop/AD/Azure:

AppSec vs NetSec:

Advice for New Web Application Security Testers:

Prashant’s Additional Advice:

Key Insights:

Actionable Takeaways:

  1. Security then was fun/exciting, now is commercial enterprise
  2. Entry paths changed - can start directly but still tough for freshers
  3. Scanners evolved but still aids - manual always needed for business logic
  4. Bad actors much more organized - bigger incentives
  5. Defense evolving because offense evolved
  6. Logging solved but monitoring/context still problem
  7. Broken access control always there - balance between security and convenience
  8. Open source from big no-no to 80% of code
  9. SBOM just start - not solution, just knowing what you have
  10. OS does not define hacker - don’t get stuck on one
  11. Research more difficult now - look at what people not focusing on
  12. Web3 interesting space but rediscovering old bugs
  13. NetSec slowly becoming absent - AppSec way to go
  14. For bug bounty: Dig deep into one area if want money, explore multiple if want corporate job
  15. Learn what and how attack works - don’t just fire payloads