My Journey Through Network Administration and Cybersecurity

I begin as a network admin back in 1993, where networking was primarily about managing multiplexers to carry voice and data over those old PSTN lines. Ah, the days when all the cables were a spaghetti mess and you’d think anything from someone sneezing near the rack would make everything fall into pieces. But working as that made me be realistic around how networks are in reality(; not what the books say).

Jump ahead a few years and I have been around for some of the worst vulnerabilities in cybersecurity history… Slammer worm — it hit networks so fast you could say patch your SQL server about as quickly! It was a wake-up call for me as I witnessed that chaos unfold — to just how fragile systems truly are.

Today I own a security firm, P J Networks Pvt Ltd, supporting business and banks to enhance their digital defenses. Most recently I helped three banks migrate their zero-trust architecture. Now I hasten to note that the zero-trust implementations of which I speak aren’t just fashionable buzzwords affixed to marketing decks; rather, they are real-world, battle-proven exercises in making us really think who (and what) we trust on our networks — and why.

And speaking of hands-on, I just returned from DefCon where they had the hardware hacking village up again! There really is nothing better then when all these concepts of physical security get hacked open and thrown around like a bad recipe in the kitchen. Security and hardware: there are always new—and frightening—things to learn.

Experience Trumps Buzzwords Every Time

But — and here is the thing about cybersecurity today: everyone has shiny tools hawking their fancy AI-detection-before-they-even-happen magical threat intelligence. Which might also be the case, I hear you say, but it seems that AI powers an awful lot of solutions and based on my experience in this industry for the past decade, I’ve seen a lot of solutions wrapped up in it to cover for bad engineering or because no thought has been put into where the real threats lie. You cannot simply set up and let it ride. A true Outlook makeover calls for due diligence, and that means exercising a little bit of your own street smarts.

Pretend you’re in a foreign AI-powered model, auto-pilot car. Yeah, neat — but when push came to shove and you hit 70 mph on the highway, would you trust your life to this thing? Or do you prefer to understand what all those flashing lights actually mean, holding onto the wheel with both hands and be prepared to take back control when necessary? I would compare this to an autopilot car being driven by mostly untrained drivers and security tools with little comprehension, at best.

Here Are Some Of What I Have Learned Over The Years

Takeaways What You Can Do Today

Short on time, here is all I recommend.

Zero Trust Architecture Not Just A Hype And Here Is Why

In banks, zero trust is not just an IT project it is a strategic business initiative. End to end — We all talk about it, yet so few actually do it. Here’s what I’ve seen:

You destroy this old assumption of everything inside the corporate network is good and make your infrastructure secure against both internal, but also external attacks.

Read More Why I Still Fight for Firewalls and Servers

But I digress all the book covers these days are on cloud and everybody forgets that your firewall or physical servers still matter. A network with improperly configured and updated firewalls is equivalent to an open target. The thought of cloud security is nice but If you thinking to drop your on-prem defenses then all I can say buckle up for an Headache which size would be as severe as Slammer worm harm done.

Also—servers. Even in the age of this cloud, so many mission-critical functions still run on physical servers behind those firewalls. I have seen cases where weak physical security has enabled attackers to pull drives in under a minute and drop them into another system.

If you are still here, let me give image analogy: If the Firewall is your stove burner, security software is the cooking pan; if stovetop firewall is nonfunctional or off you cannot cook you cannot keep device safe but a saucepan security software doesn’t as well make breakfast without fire stove. The pot and pan are the servers. Cherish both or you’re just asking for trouble.

Final Thoughts From My Desk

Call me old school, I guess. Perhaps because I matured during the age of basic network services and spent countless hours scraping off more worms, exploits than victims sanded today. But experience means something. Feeling the ghost of well-worn security choices, still plumbing the depths my networking-admin instincts to find evil.

However, I am no more stuck in the past. I, too, am a technology embracer — with caution. Yet, I dare those of you who so whole-heartedly believe in AI as it is today securing your assets without some deep human intervention. I am not a zero-trust cool bro but I do love me some zero-trust from seeing what happens when you don’t.

Regardless of whether you are a bank with billions in assets or an exploring business: Here is what I want you to do!

Alright. I need another coffee. However, I leave you with this — security is like making a great meal. You can not just buy expensive ingredients and throw in hoping it tastes good. At the very least, it requires finesse, timing and some well-placed old-fashioned savvy.

Stay vigilant,

Sanjay Seth
P J Networks Pvt Ltd

Exit mobile version