Yet here I am, on my third morning coffee, pondering a career that began in 1993 at age 19 as a kid look what was surely heaven – a sea of blinking router lights and tangled PSTN lines and muxes that transformed voice and data. That was before cybersecurity had risen to its current buzzword status. In those days, it was all networking: wires, signals and a little bit of magic to keep things in order. Fast forward to now. I own a security company that’s been focused on Computer Associates solutions, and I’ve recently been asked to help three banks overhaul their zero-trust environments, the kind of thing I never thought I would work on when I was busy running around configuring modems and patch panels. But here we are.
I have been lucky enough (or unlucky, depending how you view it) to experience and bear witness to some of cybersecurity’s greatest game changers. Like the Slammer worm in 2003 — that sicko V.D. of a worm that slammmed networks around the world before you could say buffer overflow. I recall it so acutely because it was so painful for a client of mine, who lost connectivity to their entire trading floor within minutes. Back then, our defenselessness was laughable. We had perimeter firewalls and reactive patches — and the worm ripped through anyway.
Here’s the truth: while technology changes, some basics don’t. The fundamentals of defense in depth, the requirement for appropriate segmentation, and the importance of good monitoring are still here. But today, the attack surface has exploded — cloud, mobile, IoT — it’s all connected. That’s why zero-trust was never just a buzzword; it should have been a requirement.
I literally just completed three major zero-trust upgrades with banks last quarter. They’re not created just to throw on cool tech. It’s about changing the mindset. Trust no one, Assume everyone is out to get you, Trust but verify. It’s a cultural shift, not just a technical one.
A lot of people believe zero trust is a thing you purchase. Wrong.
Zero trust is an architecture — a tenet of proving that a the user, device, or app deserves access before you give them the keys.
Here’s a fast breakdown of the key tenets of the approach:
And no, throwing up an AI-powered firewall (I’m skeptical of that buzzword) won’t save your bacon. Watching the hardware hacking village at DefCon last week was a reminder of how if a gadget is poorly designed or misconfigured, a savvy hacker can find a way around it.
Which brings me to a rant about passwords — because zero trust often translates to multifactor authentication and improved credential hygiene. But I continue to see organizations referencing password policies that could have been drafted by a sadist:
Seriously? That is a recipe for sticky notes on monitors and the use of the same password on multiple systems. Here’s my counter-advice:
I just returned from DefCon and the hardware hacking village was a hit. If you were a doubter of the physical security part of the cybersecurity equation, then you no longer are.
Here’s one nugget from those sessions:
As the saying goes, your security chain is only as strong as your weakest link, hardware included.
The software patches are what we hear the most about — less so with the devices themselves. I always counsel clients:
I’m not some cybersecurity oracle. I made plenty of mistakes. When I first started network management, I didn’t do a good job with monitoring. I thought my fattish perimeter firewall was my castle wall. Guess what? Attackers went around it.
It’s humbling — but a real lesson It’s humbling — but a real lesson:
You can no longer depend on a single layer of security. “Defense in depth” is not just a fancy term — it’s a requirement.
Pressed for time? Here’s my no-nonsense checklist:
Before you throw everything out and go cloud-native, just remember the base. Good firewalls, routers, and servers that are configured and maintained properly—these are still the bedrock of your security infrastructure. Yes, cloud is flexible, but your on-premises kit, it’s the stuff that stops determined attackers.
At P J Networks, when it comes to our managed NOC services, we mix years of networking experience (yes, we’ll take you all the way back to the PSTN) with cutting edge cybersecurity to offer NOC services that keep an eye on things AND actively chase down threats.
Nothing normalizes a team like being human. With a little experience, some curiosity and a lot of caffeine.
The Cybersecurity is very much like making a complex curry. The ingredients must be fresh, the timings exact and the process consistent. Toss in a rogue spice (that is, an unexpected hardware flaw, or a zero-day exploit), and the whole dish can go south quickly.
But — here’s the kicker — it’s very doable if you do it with respect and empathy. Don’t get taken in by silver bullets or marketing fluff. Go back to the basics, remain curious and create a culture of security.
I know, it’s exhausting. The threat landscape shifts daily. But that’s why I love this discipline. It keeps me on my toes. And if you let it, it will protect you, as well.
We’ll be off for the next week for the holiday, so keep those firewalls hot.
– Sanjay Seth, to my desk at P J Networks Pvt Ltd