Cybersecurity Insights from 30 Years in the Trenches

There is something almost magical about the smell of freshly brewed coffee and a corner office, oh so quiet allowing you time to think. Three cups in and I find myself writing one of the most familiar yet ever changing topics, cybersecurity.

Funny how quickly things can happen. I began as a network admin in ’93, playing with routers, multiplexers for voice and data over PSTN lines—yep those dinosaur days when the internet was just beginning to start. Fast forward. I run my own security outfit and here I am, still learning.

But here’s the thing. It really is experience that forms a view. And possibly, some ol’ worm named Slammer melting down your network-first hand. That was in 2003, and if you are lucky enough to not have heard of Slammer. You know, that nightmare guest who reminds you that you have no idea how to make sure the rest of your systems aren’t just as easy to break.

Okay. But before I get too nostalgic, let’s focus on what matters today. Zero-trust. Recently, I have returned from supporting three of the largest banking organisations to shift their zero-trust architectures (an absolute monster effort but so worth it). And today, that is exactly what I am going to write about: some actual lessons from the trenches and as always with a sprinkle of my rants & analogies.

Zero-Trust Not Just a Buzzword

I’ve witnessed every silver bullet solution come and go since the early 2000s. The good news about zero-trust is that it’s not a buzzword — it works. The main idea? Nothing or Nobody is to Be Trusted by Default — Not even your own NXS Team. You question every access request as if it were attempting to burgle your data, and often it is.

Surprise surprise, here is what else caught me off guard on these bank projects —

Yes, the firewalls still rule the roost, but consider them like your bouncer at a club checking ID and keeping out the undesirables from entering. Take that muscle away, and your entire zero-trust castle crumbles like a house of cards.

Well, I am a Little Cynical on AI-Based Security

So yeah, controversial opinion coming up — I am not confident in the whole AI-powered security solution craze and buzz. Don’t get me wrong, machine learning is awesome and useful for making great advances in threat detection but just slapping AI on a product and raising prices? Meh.

Why? AI models are as good as the data and training they receive. And guess what? Sometimes they are learning bad habits or just missing the obvious stuff because of some bizarre edge case. And you get a black box where you don’t really know what decisions are being made. I am old school like that — give me control and at least visibility of the tools protecting my customers.

DefCon’s Hardware Hacking Village – Still Relevant

As buzzed as I still am for having recently returned from DefCon, staring at the results of my hardware hacking village efforts. Ahh, you get a little jaded after almost 30 years in this business on software vulnerabilities. But hardware bugs? Those sting differently.

It’s sort of like catching someone making a key for your car without you knowing, but instead of only your car, it’s all cars. Catching backdoors in server boards or router chips is unheard of in Australia however. That’s scary stuff.

What struck me this year:

Lessons from the Slammer Worm as Effective Today

When the Slammer worm hit in the early 2000s, I was still patching network gear and picking up the pieces. It was a wake-up call for how few characters I needed to destroy entire infrastructures.

And what I learned — and what still seems right to me now:

Running a network today is like keeping an old car still on the road. While you can put a lot of fancy widgets and turbochargers on it, if you fail to patch it, audit it, or back it up, you are going nowhere quickly.

The Backbone of Security Firewall Servers and Routers

I mean, I get this question all the time — cloud is getting everywhere; you still need traditional firewalls and on-Prem devices! Short answer: Absolutely.

I tell clients this:

If you forget any one of these you may as well be a chef attempting to prepare fine dining using blunt knives.

Quick debugging tip? The next time that there is some freaky traffic, check the router and firewall logs to see if this unusual activity made it on here before you rush off in panic.

The One Password Policy That Annoys Me The Most

Time for my usual rant. I have yet to see a password policy that is not a complete disaster. So can we, you know, stop making everyone hate their passwords with arbitrary and capricious complexity rules.

Here’s what’ll help:

And that, my friends, is a bit like expecting a car to work without gas. A turbo can be twisted on it, but your spinning wheels in the tank.

Q What Will You Do Tomorrow

Final Thoughts

Despite what you might expect, the cybersecurity landscape has not evolved at as grand a scale as other industries. The games are grander, yes, but the basics remain critical. Almost 30 years later, I realize: it’s a lot like making sure an old car gets going every day for work.

Out of the way — best back in May before another allium goes to seed, their scope measured also by penitence.

And so, I will continue overusing italics, under-completing sentences, and integrate hating on passwords or don’t trust that Razor Mouse ad. However, most importantly, I will continue to share real insights that have been battle tested and can help keep you ahead.

Which in the final estimation, is never only about technology. This time was about people, processes and a little bit of caffeine.

Sanjay Seth, P J Networks Pvt Ltd

P.S. If you want to nerd out on zero-trust or hardware security, I am always around for a chat. Or I could lecture at you for hours about home gateways and old-school PSTN muxes. You’ve been warned.

Exit mobile version