I am here at my desk — on my 3rd cup of coffee this am, the all too familiar fatigue / adrenaline blend that us security people are addicted to. Sometimes I wish my brain was not wired like that (with a career starting in the dark age of 1993 as a network admin playing with some muxes for voice and data over the good old PSTN). Oh those were the good old days, no cloud, no crazy firewalls … just pipes and switches. And what a journey it’s been. Having personally fought the Slammer worm (I really am starting to believe we will never be safe) and now working tirelessly to help banks build strong, zero-trust architectures with my company. These are just a couple of real experiences and lessons learned along the way that you probably would not expect.
I would have laughed that in the early 90s if you had said I was waiting for the day when I’d be fretting over AI powered hacks or zero-trust networks. We had fucking cables and dial-up modems and agoda knows there was the one time the multiplexer threw a fit. Security was seen as a checkbox, not asa philosophy. But then Slammer hit in 2003. Remember that nightmare? That worm downed banks and airlines and any other company with a lame SQL Server. It hit one of our clients, and I was on-call. It spread very quickly, seemingly as if someone had hit the fast forward button for malware.
Unfortunately, we then learned that it turned out classic perimeter defenses were only a speed bump for the attackers. That and something about a castle-and-moat security model just feels wrong, doesn’t it? At this point, it was getting hard not to go with the cliché — Trust no one.
Fast forward to today. At the turn of my career, I lead P J Networks Pvt Ltd, a company dedicated to cybersecurity, managed NOC, firewalls, servers and routers. Those Sisyphean demands increase when instead of managing clients you are in charge or running your own firm. And man, I gotta say, its quite a jungle out there.
I recently assisted three of the world’s largest banks in re-imagining zero-trust architectures. These are not exactly the laid-back banks of security — they’re more like the Fort Knox of the digital world. But they too had an over-reliance on legacy systems.
So, here are a few quick truths that I have learned from these projects :
So, once again: AI-powered security tools ARE NOT a silver bullet. I am so skeptical of any answer that relies on AI without transparency. AI is not a substitute for good architecture; it is an imperfect… sort of a tool.
Oh — and DefCon only just ended. Then the hardware hacking village by itself was crazy. While everyone freaks out about remote exploits and software bugs, the physical layer is ignored. Until it’s too late. Watching security researchers bear $5 hardware and smash locked-down murderous encryption (using little more than a soldering iron and screwdriver) jogged my memory layer protection reigns king.
Reality Check time: that shiny new firewall or server? Cybersecurity is not just bits and bytes. It’s also who can touch your machines, your wiring closets—or your servers in the back room.
Another thing I can’t shake, password policies. We make them so complicated, so crazy, that users either write them down or work around them. There’s no one size fits all. Still, businesses everywhere are holding onto antiquated policies — such as forcing users to reset their passwords regularly, which only serves to weaken security. Instead, consider longer passphrases, biometric factors, and—yep—multi-factor authentication. It’s not sexy but it works.
Because really, mandatory special characters, numbers, uppercase that expire every 30 days is somewhat like telling someone to prepare a five-course meal with nothing but a spoon. Maybe, but no one is going to do this properly.
Now cloud and SaaS everywhere, some think they are not risky because lazy to “outsource” everything. That’s a dangerous myth.
And here is what I learnt running a managed NOC.
These are fundamentals. Technology has evolved, but the discipline is still the same.
I am somewhat (ok, perhaps quite) skeptical about today’s all-encompassing AI fever used for cyber security products. A lot of shiny objects: They have potential, but so far it may be mere hype. The reality? The enemies are only becoming more intelligent, and even they use AI against us.
This is why I always encourage a combination of the two:
And yeah, sometimes gotta hit up the old-school. Firewalls, servers,Routers (when set the way they should be), are still some of your first line heroes.
The most significant lesson I would pass on in reflecting on my career from when I was first loosed upon the world with my accreditation as a network administrator back in ’93 is simply this:
Also, for heaven’s sake, do not forget the sheer willpower of copious amounts of coffee can work wonders to keep everything going.
Thanks for reading. Stay safe out there.
– Sanjay Seth, P J Networks Pvt Ltd