1. Are the current methodologies sufficient for the current generation technologies or is there a gap, if there is, then what is it and has there been any work going on to fill it in?There is always a gap. Protection methodologies are reactive in nature. Both vendors and academia are constantly researching new means of protection, just as the the "bad guys" are always thinking of new ways to thwart these protections. The same holds tru for vulnerability assessments. How successful vulnerability testing is has everything to do with the skill set of the person or company performing the assessment. Many assessments done by general practitioner consultants use pre-canned tools. These tools only check for well known vulnerabilities by the simplest means possible and often provide many false positives.
current generation web App
next generation web applicationsThere is little to no difference between past, present, or future web apps. You have display code, some scripting or compiled language to perform actions, and possibly a database backend. The languages may change (asp, asp.net, php, html5, etc.), but they all function in the same way and do the same things. When you see something like Web 2.0....this is nothing but marketing hype.
will these methodologies be able to assess the next generation web applications ( developed in technologies like SAP, Oracle, IBM or more advanced ones )?First I'd like to mention that the items mentioned are not technologies, they are vendors who utilize a vast number of different technologies to create their products. The pre-canned tools are constantly adding new vulnerabilities to look for and the rare few individuals who have the skills necessary to do indepth assessments are always learning to keep up with changes.