Security Then and Now

Null Charcha

2022/06/11

AI Generated Summary

This is the first episode of Null Charcha, a panel discussion featuring Anant Shrivastava and Prashant discussing “Security Then and Now” - comparing security practices from 10+ years ago to the present day.

Panelists

Key Topics Discussed

Security Then vs Now:

2000-2010 Era:

2010-2022 Era:

Entry Paths:

Tools and Automation:

Scanners:

Manual Testing:

Bad Actors:

Evolution:

Defense Evolving:

Logging and Monitoring:

Logging:

Monitoring:

Mindset Change:

Defensive Evolution:

Frameworks:

OS Level:

Automation:

Broken Access Control:

Why Always There:

Amalgamation:

Funny Vulnerability Stories:

Prashant’s Story:

Anant’s Stories:

Other Stories:

Open Source:

Evolution:

Open Source Term:

Open Source in Corporate:

SBOM (Software Bill of Materials):

SBOM Effectiveness:

Operating Systems:

OS Does Not Define Hacker:

Scenarios:

Blurring Boundaries:

Security Research:

Term:

Research Difficulty:

Research Then vs Now:

Quality Research:

Example:

Advice for Quality Research:

Future of Security:

Web3:

Blockchain:

Metaverse:

Web3 Security:

Web2 Attack Patterns:

Desktop/AD/Azure:

AppSec vs NetSec:

Advice for New Web Application Security Testers:

Prashant’s Additional Advice:

Key Insights:

Actionable Takeaways:

  1. Security then was fun/exciting, now is commercial enterprise
  2. Entry paths changed - can start directly but still tough for freshers
  3. Scanners evolved but still aids - manual always needed for business logic
  4. Bad actors much more organized - bigger incentives
  5. Defense evolving because offense evolved
  6. Logging solved but monitoring/context still problem
  7. Broken access control always there - balance between security and convenience
  8. Open source from big no-no to 80% of code
  9. SBOM just start - not solution, just knowing what you have
  10. OS does not define hacker - don’t get stuck on one
  11. Research more difficult now - look at what people not focusing on
  12. Web3 interesting space but rediscovering old bugs
  13. NetSec slowly becoming absent - AppSec way to go
  14. For bug bounty: Dig deep into one area if want money, explore multiple if want corporate job
  15. Learn what and how attack works - don’t just fire payloads