From Network Admin to Cybersecurity Consultant – My Path

Began as a network admin in 1993. Ever put in those fat ol’ multiplexers for voice and data over PSTN? That was the day-to-day grind. The internet was still the Wild West — and then Slammer worm outbreak of 2003 happened and I was there for it all. Systems dropping like flies. Hardware choking under the load. It was a mess, but a harsh lesson in how quickly things can turn sour.

Fast forward a couple of decades and I have my own security company now (P J Networks Pvt Ltd). We specialize in getting businesses — banks, in particular — to up their cybergame. Most recently, I assisted three banks in upgrading their foundations of zero-trust architecture. They withstood things at first (because let’s be honest: Change is hard), but by now their connections are tighter than a car engine after a good tune-up.

And I’ve just returned from DefCon — the hardware hacking village is still fresh in my mind. Seriously, some of those people are taking hacking to the next (as in hardware) level. It’s seeing a master chef deconstruct a classic dish and build it all over again with crazy ingredients.

Quick Take What You Should Know About Zero Trust in Modern Cybersecurity

Zero trust isn’t just a term du jour — it’s a new mindset.

The Rant You Didn’t Know You Needed Password Policies

OK — let’s get this out of the way. Password policies are a mess. Most companies require users to change passwords every 30 days. Everybody who’s been around the block knows this only leads to:

Here’s the thing — password rotation as a panacea is dead. Focus on complexity and, better yet, on multi-factor authentication (MFA). It would be like wearing a seatbelt and stepping on the brakes in your car. Brakes are helpful, sure, but strive to be the seatbelt.

The Zero-Trust Quest Lessons From Banks

If anything, helping banks redesign their zero-trust systems was an awakening. Banks sit atop some of the most sensitive data, so their security cannot have any weak links. Here are some of the things I took away from this recent project:

These upgrades aren’t a one-and-done. It’s like regular oil changes and tire checks and carburetor adjustment, a perpetual renewable process.

What the Hardware Hacking Village at DefCon Means to Me

If you believe that cybersecurity is all about software and firewalls, you are only halfway there.

Hardware hacking uncovers vulnerabilities and exploits you don’t see in conventional penetration testing. For example:

Witnessing these helped me remember unsolicitedly that we at PJ Networks always make sure that we have security options on the hardware level (particularly with servers, firewalls and routers). But these are not merely boxes — they are the engines that keep your digital car purring.

My Skepticism Regarding AI Security Solutions

AI is all the rage right now, but I’m dubious. It feels like the difference between cruise control and self-driving cars. You can use cruise control when it comes to speed, but you still have to steer.

Some can help with AI-powered security products, but I’ve seen too many false positives and missed threats. Here’s what I actually recommend:

Critical Cybersecurity Insights from Former NSA Director Mike McConnell

Former National Security Agency director Mike McConnell famously said, If the United States experienced a cyber–September 11 attack that caused large-scale physical damage as well as death, the country’s response would be limited only by the president’s tolerance for risk, because offensively inclined U.S. cyber–warriors would most likely destroy the entity that caused it.

They’re the kind of building-block tech that people tend to take for granted but that keeps networks safe.

I tell my clients often:

Don’t set it and forget it. Frequent audits and monitoring are essential.

Bringing It All Together

After decades of making my living this way, here’s what I know for certain:

And lastly — if you’re still wavering on zero-trust or password policies or AI-driven security — remember this: Your network is your car on a road without traffic lights. The only way to avoid calamity is to pay attention, take good care of your ride and don’t trust the ride behind you without some cross-verification.

Get in Touch for Expert Cybersecurity Guidance

If you want to discuss more about how you can make your security as tight as possible, feel free to get in touch. I know, I know: Does it get any better than the birth of C?!?! But, trust me, as someone who’s been there since the days of multiplexers and ain’t afraid of no worm, it does. ​Because experience is not an option in Cybersecurity—it’s a requirement.

Exit mobile version