Join us at our next webinar: Mastering API Security Testing
Join us at our next webinar: Mastering API Security Testing
Join us at our next webinar: Mastering API Security Testing
Join us at our next webinar: Mastering API Security Testing
Join us at our next webinar: Mastering API Security Testing
Join us at our next webinar: Mastering API Security Testing
Close
Privacy settings
We use cookies and similar technologies that are necessary to run the website. Additional cookies are only used with your consent. You can consent to our use of cookies by clicking on Agree. For more information on which data is collected and how it is shared with our partners please read our privacy and cookie policy: Cookie policy, Privacy policy
We use cookies to access, analyse and store information such as the characteristics of your device as well as certain personal data (IP addresses, navigation usage, geolocation data or unique identifiers). The processing of your data serves various purposes: Analytics cookies allow us to analyse our performance to offer you a better online experience and evaluate the efficiency of our campaigns. Personalisation cookies give you access to a customised experience of our website with usage-based offers and support. Finally, Advertising cookies are placed by third-party companies processing your data to create audiences lists to deliver targeted ads on social media and the internet. You may freely give, refuse or withdraw your consent at any time using the link provided at the bottom of each page.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

august 6-7 | Booth 4830

Visit Wallarm's Cyber Security Museum

Explore the past, understand the present and learn how Wallarm is built for the future.

Block and defend API attacks, don’t just detect them! As you expand your use of cloud infrastructure, modern applications, and agentic AI, attackers continue to exploit APIs to get access to your most sensitive systems. Blackhat attendees, learn about the latest trends in API security and chat with Wallarm’s technical teams to gain insight and experience for their API and AI security initiatives.

Swing by booth #4830 for a private tour of the Cyber Security Museum. If you're interested to Meet Us in our executive suite just a few blocks away from the conference, click the button below.

Enigma Machine

This electro-mechanical rotor cipher device was used by Nazi Germany to encrypt military communications. Thought unbreakable, it was eventually cracked by Alan Turing’s team at Bletchley Park — proving that complexity is no substitute for resilience.

TBY-8 Radio

Used by Navajo Code Talkers to transmit secure messages during WWII. The Navajo language's complexity, including its unwritten nature, tonal qualities, and unique syntax, made it virtually impossible for the Japanese to decipher. The Navajo Code Talkers ensure message confidentiality and integrity at speed to support critical operations, a role that secure APIs play today.

2600 Magazine

A legendary publication born in the early computer underground, 2600 gave voice to hackers, phreakers, and digital explorers. It championed curiosity and open access—values that echo today in open-source security research and API vulnerability disclosure.

Blackberry 850

The first widely adopted mobile email device brought encrypted corporate communication into pockets everywhere — but also opened a new frontier of remote-access vulnerabilities and mobile API exposure.

Scytale Cipher

This cylindrical tool was used by the Spartans to transmit secret military commands. A strip of parchment wrapped around the rod would reveal a hidden message, unreadable unless wound around a rod of identical diameter — an early example of key-based encryption.

Rosetta Stone

This granodiorite stele, inscribed in three scripts — Greek, Demotic, and hieroglyphics — enabled scholars to decode ancient Egyptian writing. It’s a symbol of language translation and interoperability — the same challenges modern APIs face across platforms and systems.

Caesar Cipher

Attributed to Julius Caesar, this shift cipher replaced each letter with one a fixed number of places down the alphabet. Though simple, it represents one of the earliest known forms of algorithmic encryption — and the enduring principle that obfuscation alone is not security.

Norton Antivirus

Packaged AV software became a household name — but it couldn’t protect against logic abuse or custom API attacks. It represents the limits of file-based scanning in a post-signature world.

Enigma Machine

This electro-mechanical rotor cipher device was used by Nazi Germany to encrypt military communications. Thought unbreakable, it was eventually cracked by Alan Turing’s team at Bletchley Park — proving that complexity is no substitute for resilience.

TBY-8 Radio

Used by Navajo Code Talkers to transmit secure messages during WWII. The Navajo language's complexity, including its unwritten nature, tonal qualities, and unique syntax, made it virtually impossible for the Japanese to decipher. The Navajo Code Talkers ensure message confidentiality and integrity at speed to support critical operations, a role that secure APIs play today.

2600 Magazine

A legendary publication born in the early computer underground, 2600 gave voice to hackers, phreakers, and digital explorers. It championed curiosity and open access—values that echo today in open-source security research and API vulnerability disclosure.

Blackberry 850

The first widely adopted mobile email device brought encrypted corporate communication into pockets everywhere — but also opened a new frontier of remote-access vulnerabilities and mobile API exposure.

Scytale Cipher

This cylindrical tool was used by the Spartans to transmit secret military commands. A strip of parchment wrapped around the rod would reveal a hidden message, unreadable unless wound around a rod of identical diameter — an early example of key-based encryption.

Rosetta Stone

This granodiorite stele, inscribed in three scripts — Greek, Demotic, and hieroglyphics — enabled scholars to decode ancient Egyptian writing. It’s a symbol of language translation and interoperability — the same challenges modern APIs face across platforms and systems.

Caesar Cipher

Attributed to Julius Caesar, this shift cipher replaced each letter with one a fixed number of places down the alphabet. Though simple, it represents one of the earliest known forms of algorithmic encryption — and the enduring principle that obfuscation alone is not security

Norton Antivirus

Packaged AV software became a household name — but it couldn’t protect against logic abuse or custom API attacks. It represents the limits of file-based scanning in a post-signature world.

Meet with the Wallarm Executive Team

Discover how to take back control of your third-party cyber risk. Meet with Wallarm at Black Hat to learn how MAX, our managed SCDR platform, continuously detects threats, drives remediation, and secures your extended supply chain.

Go beyond ratings: See how we turn risk insights into action with real-time detection, expert-led response, and direct vendor remediation.

Accelerate your outcomes: Learn how SecurityScorecard MAX reduces time-to-resolution, cuts zero-day exposure, and mitigates breaches before they spread.

Strengthen your security operations: Explore how we integrate risk intelligence across security, GRC, and vendor management workflows to drive resilience.

Join us for dinner

If the show floor isn’t your thing, or you just want to take advantage of the amazing restaurants in Vegas, join Wallarm for an executive dinner. We’ll be hosting exclusive dinners with our executives on Tuesday August 5, Wednesday August 6, and Thursday August 7. Request a seat at the table now.

Request a Seat

Just Try Wallarm!

Not going to Black Hat USA 2025 this year? With our free, no-obligation 30-day trial, you can take action now to strengthen your application security program. See for yourself how you gain full visibility into your application and API estate in minutes and get real-time detection/mitigation with scalable cloud-native deployment.