Reflections from a Cybersecurity Veteran: Lessons from the Past and the Path Forward

It’s 3rd coffee o’clock, and here I sit at my desk, looking at artifacts of days of yore, when all I was, was a network admin in 1993. That was another world entirely, the world of voice and data commingling over PSTN lines through enormous multiplexers. No fancy cloud talk, no AI-everything. Nothing but raw cables, the flashing lights of routers and the occasional bout of panic when something went wrong in the network. Then, security was something of a side hobby — not yet the multibillion-dollar industry it is today.

And yet, it’s funny the way some cyber threats never quite grow old. A case in point was the Slammer worm of 2003. When Slammer hit, I was knee deep at a client’s site chasing problems when it felt like 24 hours passed and Slammer had touched down overnight and screwed up networks worldwide, mine included. Slammer wasn’t exactly discreet; it wriggled through a hole in SQL Server and merrily infected everything in sight. I recall working through the night patching systems, analyzing packet captures, attempting to understand the madness.

From Network Admin to Security Expert

Fast-forward to today and I am the head of my own security outfit, P J Networks Pvt Ltd. The problem has multiplied exponentially — just like the tools (and headaches). Three different banks recently brought me in to redo their zero-trust architectures. Zero-trust isn’t just a buzzword. It’s the paradigm shift every enterprise requires especially now that the perimeter is long gone and users/devices can no longer be trusted by default. Why all the fuss with zero-trust? Easy — it’s the closest we ever come to actually assuming risk in today’s distributed society.

The Limitations of Traditional Firewalls

The fact is — those old-school firewalls and perimeter defenses only get you so far. I see companies that are still grasping the old way, using complex, rule-laden firewalls as though they were weaving a safety net. But if you ask me, most are hole-riddled swiss cheese that’s only waiting to be exploited.

Quick Takeaways for Those in a Rush

Why Implement Zero-Trust?

Because trust is expensive, and trusting by default anything inside of your network is a recipe for failure.

When I was using those banks, deploying zero-trust was:

And yes, it’s all very much not plug-and-play. It takes planning and buy-in from all levels of the organization. You like a straightforward dashboard? That’s in the movies. Real zero-trust work is like tuning a performance car — it involves some amount of tweaking, diagnostics and, occasionally, staring at the engine light blinking at you for hours.

The Importance of Hardware Security

I’m exhausted though still high on DefCon and especially the hardware hacking village. Watching those people reverse-engineer IoT gadgets and embedded systems was a great example of how often we gloss over the hardware security side of things. Software hogs the spotlight — AI this, machine learning that — but what about firmware? If your devices themselves are compromised, it’s not going to cut it to patch software holes.

Think about that old analog car you cherished. You could open the hood, fiddle with the carburetor, and possibly do it with duct tape and elbow grease. But try doing that with modern IoT gizmos and — it’s a black box of crap.

Password Policies That Put Security at Risk

Let me be blunt: your password policies are getting people killed.

Seriously. I consistently work with clients who implement very odd rules: forced special characters, changes every 30 days, length restrictions that make no sense. This leads to:

Here’s a recipe for disaster you couldn’t possibly want. Instead:

The fixation on complexity over use? It’s like attempting to make a gourmet dinner with stale food — seems great, still tastes nasty.

The Reality of AI Security Solutions

Speaking of which — how about AI security solutions? I’m skeptical. I’ve seen lots of glossy sales and marketing fluff that claims AI will be the solution to all your security problems. But AI is only as strong as the data with which it’s fed, and attackers are becoming smarter, faster.

Plus, trusting AI implicitly can lead to unattended gaps, because context is important. Automated detection goes a long way, but human insight and expertise still can’t be replaced — no matter what the vendors tell you.

Maintaining the Backbone of Cybersecurity

Returning then, to firewalls and servers — they still sit at the heart of any business’s cybersecurity posture. But consider them a car’s chassis and engine. Without the right maintenance, the best design will appear like crap. That entails regular firmware updates, configuration reviews and, frankly, knowing when to call it quits and replace old gear.

I’m a strong believer that security is not simply a technology issue — it’s process oriented, people focused and yes, sometimes messy. I’ve seen companies with the fanciest tech stack fail miserably because they forgot the fundamentals: user education, clear policies, response plans.

Pragmatic Cybersecurity Checklist

Here’s an easy pragmatic checklist I give to my clients, especially those processing sensitive information (banking, health care):

And let me tell you, cybersecurity is just like having an ancient classic car. It requires dedication, expertise and the occasional expletive. But if you put in the effort, the ride can be smoother, safer and, dare we say, even pleasurable.

The Future of Security

So what’s next for those serious about security? Stop thinking in terms of software patches and antivirus alone. You want holistic solutions that include zero-trust, monitoring at the hardware layer, and yes, user behavior analytics. And let’s not forget the importance of experience — things I’ve had to learn the hard way, things that have taken me decades to learn.

I’m getting close to wrapping this up, but let me leave you with this — if you want to engineer tolerant systems, think like a mechanic who has spent years un-sticking jammed carburetors and deciphering mischievous engine codes at the same time.

Stay curious,

Sanjay Seth
Cybersecurity Consultant
P J Networks Pvt Ltd

Exit mobile version