The investment into both offensive and defensive technologies has grown dramatically in line with the Internet’s rise as the pivotal system for communications, critical infrastructure, and global finance. Security of the Internet, cloud data, and personal devices, once an afterthought, is now a significant expense and stress on governments, organisations, corporations and individuals. No one remains untouched. Yet, as the offensive scope spreads, so do the defensive barriers, leading to a technology arms race on various fronts. Where are we in that race? And, looking to the future, can we predict the near-term balance of power between defensive mitigation and offensive ingenuity?
===
Mark Dowd is an expert in application security, specializing primarily in low level Operating System flaws for desktop and mobile platforms. He is the co-founder of Azimuth Security (recently acquired by L3Harris), a vulnerabilty research company that specializes in code review and cutting edge security research. Prior to starting Azimuth, his professional experience includes several years as a senior researcher at a fortune 500 company, where he uncovered a variety of major vulnerabilities in ubiquitous Internet software. Mark has also co-authored a book on the subject of application security named “The Art of Software Security Assessment”, has spoken at several industry-recognized conferences including BlackHat, Hack In The Box, and CansecWest. He is also a member of the Black Hat Review Board.
===
Mark Dowd is an expert in application security, specializing primarily in low level Operating System flaws for desktop and mobile platforms. He is the co-founder of Azimuth Security (recently acquired by L3Harris), a vulnerabilty research company that specializes in code review and cutting edge security research. Prior to starting Azimuth, his professional experience includes several years as a senior researcher at a fortune 500 company, where he uncovered a variety of major vulnerabilities in ubiquitous Internet software. Mark has also co-authored a book on the subject of application security named “The Art of Software Security Assessment”, has spoken at several industry-recognized conferences including BlackHat, Hack In The Box, and CansecWest. He is also a member of the Black Hat Review Board.
- Category
- Security
- Tags
- hitb, hitbsecconf, hackinthebox, AVA 360 security
Sign in or sign up to post comments.
Be the first to comment