The Evolution of Network Security and the Imperative of Zero-Trust

I have been around this game since early 90s; network admin from 1993, managing voice and data multiplexing over PSTN. Back in the days when network security, for the most part, meant trying to keep weather off the wires and hoping nobody accidentally unplugged something important. Then came the Slammer worm. That was a harsh reality check for all of us. I experienced my first live demonstration of how a single line of malicious script could disrupt the installation in minutes. Cybersecurity got very real very fast for me — much more than a simple IT checkbox.

Fast forward to today. I own a security company, P J Networks Pvt Ltd, and completed zero trust upgrade for 3 banks. I’m still catching my breath after DefCon, in particular the hardware hacking village which left me full of ideas (and some mild anxiety). The true story for zero-trust is that it is not another buzzword. It’s a necessity. And I want to tell you why, because believe me as someone who is going through it right now, with many a cup of coffee under my belt and an occasional misplaced semicolon or two.

Why Zero-Trust? Old School Network Mindset Deceased

The old days networks were as closed as locked garages…you had a key to 100 garages.–a password. But now, that is a huge bet. Slammer worm: A public health cyber attack of its time, propagating everywhere within networks due to trust. Things have changed. Solution architects will no longer be able to rely on perimeter-based security like a moat placed around them, with once inside the gates that fortress was your true blessing.

This term is otherwise called ZERO-TRUST and it simply means never trust, always verify. No exceptions. It goes way beyond just access control — it is authenticating everyone, every device, every time.

Thing that recently brought me to realize working with banks on implementation of this concept was following two:

Segmentation is also your friend because, avoid a walking key to everything for the attackers.

MFA is not voluntary; it is an MFA must have.

Yes, I know that some organizations just think all this is annoying. But here is the dealie, your security policy should be risotto level strict. You can’t rush it. Take shortcuts, and you get gumption.

Examples From Personal Life- Success And Failures

One of the banks I was taking to at that time just wanted a quick-win on their “old insecure legacy systems” and believed if they found an antivirus with AI-powered detection mechanisms they could solve everything. I was skeptical from day one. Yes, AI can lend a hand, of course… but call me old-fashioned; Ive seen how ‘AI-powered’ often feels like marketing fluff.

We instead fell back to network segmentation and rigorous zero trust policies with the continuous monitoring of everything.

And guess what? Malware that would have been able to run free after a phishing hit was stonewalled — not by AI, but thanks to a strict policy and user training (yes, people still count!)

I watched a demo one time at DefCon’s hardware hacking village which changed my perspective on security hardware entirely. Originally, the hacker demonstrated — with no small amount of irritation and eyes rolling — how a so-cool vintage router exactly like the ones I used to setup in 90s can have its physical self-tampered-with to grant persistentspawn access. That means no software, or firewall etc. just a fancy detection. Just good old hardware vulnerabilities.

Hardware security is just one example, and for our purposes, I will still argue it is often overlooked.

When you invest in physical devices, firewalls, servers or routers, do not forget: parasites are everywhere. The physical layer still bites.

Fast Take: Next Steps for You as a Company

I get you. You’re busy, probably drowning in jargon and wondering where to start. Here’s a quick checklist for zero-trust based immediate cybersecurity posture upgrade:

Why Password Policies Drive Me Crazy

I will level with you: I hate passwords. Companies either make them too weak or too complicated, leading to their users writing them on sticky notes on the monitor. A brief summary of passwords:

Reflecting on My Early Days vs Today

I remember pensioning multiplexers for the PSTN – it was like handling a mechanical wristwatch when compared to today’s 4G smartwatch. Back then, an attack was a brute force. Today, it is a small-package delivered by a drone. Yet, wisdom never changes:

Skeptical About AI? You’re Not Alone

Look, AI is the hot topic. Yet I am hedging my bets a little. FAR too many ‘AI-powered’ tools claim to be magic wands that will do everything with minimal effort. Alright, reality check: AI is a tool, not a magic wand. You still need solid fundamentals.

The biggest risk? This can give businesses an illusion of safety, leading them to depend too much on AI. “our AI will detect all”—famous last words

However, I am an open-minded person and keep the tab of this space very closely. It is exciting; however, do not throw your firewalls and zero-trust policies to the side just yet.

Conclusions by This Just Marginally Jacked on Coffee Consultant

The security landscape is always changing, but some fundamentals remain steady. Zero-trust architecture is not an IT luxury, but rather it has become a necessity for any business, which deals with sensitive shareholder information (e. g., Banks or Healthcare) to prevent a continuous set of external threats.

My one off-the-cuff piece of advice, if I could give you? Be this:

As you ponder these questions, never stray too far from the basics—solid policies, segmented networks, hardware security and employee training are all part of your armoury, so make sure they remain firmly in place as you dabble with AI.

Just that this battle is never won (if there is anything to be taken from my 30+ years). At the end of the day you just have to layer your defense and hold onto a little skepticism so you can sleep at night.

Oh, by the way—if you need someone to talk about routers, zero-trust, or why password policies must die in a fire—drop me a note. Iʼm just sitting here with my fourth coffee because I’m sad and lonely and desperate to shop.

Sanjay Seth
P J Networks Pvt Ltd
Cybersecurity Consultant since 1993

Exit mobile version