
It is important to release fixes so others will not do the same mistakes over and over again. Dan Kaminsky urged the audience not to compete on security. It is a fact that many people write insecure code. First, the environment is managed by security specialists and second, if a breach occurs, it is not their personal computer that is compromised, but an instance in the datacenter. Since many users are overwhelmed with security concepts or configuration options, a move to a cloud environment could help those users to stay safe.


Having gained track in recent years, virtualization and cloud computing are still hot topics.
#DEFCON VEGAS DATES 2016 SOFTWARE#
By the time an attacker has reverse-engineered a specific software version, it has already been obsoleted. Fast software release cycles may help to stay ahead of attackers, a strategy chosen by Facebook. While it takes the fastest companies 2 days to clean up, the slower companies need one week. Being able to implement fixes after a breach in a timely manner is crucial. The only way to tackle complexity is simplicity. This year’s keynote was presented by Dan Kaminsky, probably best known for his DNS cache poisoning attacks. He identified the growing complexity and the need for speed as the main trends in IT. In the following, we are going to summarize a selection of the talks attended.

This year’s Black Hat conference, the 19th edition, took place at the Mandalay Bay Conference Center while DEF CON 24 was located in Paris and Bally’s in Las Vegas. At the beginning of August, as every year, two of our security analysts attended the most renowned IT security conferences Black Hat USA and DEF CON to learn about the latest trends and research.
