I am sitting here at a desk on my third coffee of the morning, my hardware hacking village post-DefCon high finally starting to subside. It is strange that some things after nearly three decades in this business (I started as a network admin back in 1993, managing PSTN multiplexers for voice and data), remain somewhat the same. The tools have changed, the threats are more numerous, but the central reality is unchanged — security is not a product; it’s a mindset.
But allow me to share some hands-on anecdotes that have influenced my perspective on cybersecurity today. _ — Things I believe every business, and the IT teams that support them, should internalize.
In the early 90s, my day job was rooted to the Public Switched Telephone Network (PSTN). The old multiplexers — stout creatures, brick-like boxes optimized for bronzing voice and tabulating data flows. Today’s network gear is difficult enough — imagine managing a telco multiplexer older than some folks on your IT team with this thing.
A quick lesson I learned: though it may appear that technology will stand the test of time, complexity introduces an element of risk. Oh, and on the topic of risk — I can recall that Slammer worm day better than yesterday. Slammer was a SQL worm in 2003 that spun through vulnerable network segments like wildfire. You name it — fixing all things routing and subnet isolation, keeping voice up when data began to crumble in front of me….
The thing is, Slammer taught me a very important lesson — patching is not optional. It’s mandatory. But even to this day, organizations are dragging their feet. I know, I know — maintenance windows… systems are fragile; though ignoring patches makes attackers jobs that much easier, whatever firewall vendor or expensive IDS you might have.
Cut to today — running my own cybersecurity consultancy with an added managed NOC(Network Operations Center). Despite working in different industries one-part stays the same — getting execs to understand their defence cannot be a castle with a single moat. And that’s where I’ve been lately, assisting three banks to upgrade their zero-trust architecture.
The term zero-trust is pretty much just buzzword bingo anyway. However, my concern is that zero-trust isn’t simply a tech solution – it’s a mindset predicated on the idea that breach will occur eventually. You receive no traffic based on trust from the inside or outside. Every request verified, interrogated, and logged
Some of you will recognize what that looks like in practice, and for these banks this is essentially a bird eye view of what we focussed on with those banks:
Still, I have to admit: it has been satisfying to watch these banks follow NIST’s lead and begin pivoting away from traditional perimeter-based defense models. The old castle and moat? Dead. Trust no one.
Back from DefCon — my yearly geekMecca-pilgrimmage. The biggest buzz I got was from the hardware hacking village. Why? Because: despite the software holes making all the noise, hardware attacks are still woefully underrated.
For me, watching people open up hardware and flash firmware and create bypasses on essentially instant. Software is fugacious: patches and updates. Hardware flaws? They’re baked into silicon.
It made me think of an automotive analogy where most people are obsessive about changing their car’s oil or tires but have never inspected the health of their brake lines. The hardware vulnerabilities are those brake lines. Ignore at your peril.
And a hot take I have no quibbles with is most password policies in the wild are totally misguided. That would be equivalent of making 15 special characters mandatory — just as if we required each cook to add truffles in the soup. Sometimes, less is more.
When a 16 digit password is not an option for users you get password123, written down on scraps of paper or even worse in plain sight using sticky notes. If You Need Security, Design for Usability First.
To put it simply, think of cooking pasta. No one simmered their spaghetti sauce for an hour praying it gets better. And passwords — don’t over cook complexity.
I complain, but i do, you know. Because I am concerned that in undertaking this exercise, companies will give into the false security of checking compliance boxes and as we witness creeping AI-mania, neglect basics.
Something I have learned the hard way — security fatigue is a real thing. Blasting teams with tools and alerts provided in a vacuum freezes them. I remember, weeks spent watching dashboards getting wasted.
And the best way to tackle it is by learning how to earn revenue before you scale: which leaves me to this advice for business leaders.
After all, your security posture is only as strong as the mindset of your team and your risk culture.
Others might call it a little traditional already, but for me, I still swear by the basics:
Experience still plays well in today’s rapidly changing threat landscape. Years of watching routers, old PSTN muxes and now bleeding edge zero-trust implementations provide me a view that no marketing material can compete with.
If there is one thing that I want you to takeaway — security is a journey and not a checkbox. But maybe, just like I learned from Slammer’s havoc or DefCon’s hardware flubs of the past, you can avoid the next initial shot.
Ok, I guess its coffee number four. Stay sharp out there.