I’m sitting here at my desk, having downed my third coffee, thinking about the roads that got me here today. Cybersecurity consultant of a few eras (yep was a network admin in ‘93), founder of P J Networks Pvt Ltd, I’m currently still coming down off my caffeine high from just getting back from DefCon’s hardware hacking village. It’s wild how different everything is now. But some things? They never do.
But here’s the thing – when I got started, I was stringing networks and working with multiplexers, so that voice and data could get it on together over the old PSTN. Remember those days? No cloud, no fancy AI-powered doohickeys (to be frankly honest, I’m still skeptical of the fuss over that, too). Pure tech, plugged in and humming.
Fast forward to the early 2000s — Slammer hit us like a runaway train. I saw up close how brittle the best-laid infrastructures actually were. Whole offices are dropped in minutes by some little piece of malware rampaging through unchecked. It was a harsh lesson for a fresh-faced admin with grand visions.
Today, I operate my own security company where I shepherd organizations (mostly banks currently) through the labyrinthine realm of modern cybersecurity, with an intense concentration on zero trust architecture. Just finished helping three banks upgrade their technology. And I do not say this lightly if zero trust is not on your mind, you’re already behind. The old perimeter defenses? They’re yesterday’s factory locks.
And this brings me to an important issue: The greatest threat does not come from hackers or malware. It’s complacency. After all these years consulting with my customers, and running our managed NOC (Network Operations Center), I still have customers relying on firewall configurations written a decade ago, or, god forbid, just a password policy that couldn’t have five-character passwords, it would break things.
And don’t even get me started on passwords. The manner in which many companies attempt to motivate complexity with unending resets and arcane rules? It’s a recipe for disaster. People just write them down. Here’s a cooking analogy: You can season and season to your heart’s content, but if the grocery store was selling a bad piece of fish, the meal is a disaster! Likewise, not all the security layers will help you if your actual authentication is weak.
Yaptaappworking with banks, and the bank is a serious and urgent institution. Because banks are constantly at risk, not just from external threats but from insider mistakes. Here’s a glimpse:
But — and this is important — technology is not a panacea. You need to get buy-in across the org. Security isn’t just IT’s job. It’s everybody’s responsibility.
Wandering through the hardware hacking tents was exhilarating. Once you realize that you can physically torture or probe something you trust — your firewall, some router, even a “secure” server — it changes the way you think.
Until recently, such hardware vulnerabilities have been an afterthought, but that is changing rapidly. Here’s a brief snippet of what stayed with me:
When I work with clients, I frequently tell them the network is like a car, you can have the greatest engine, however, if someone is able to undo the wheel bolts, you are immobile.
I know compliance frameworks just love password complexity rules. But in application, 15-character-required passwords with mandatory changes every 30 days? You’re putting people on a path to fail. They’ll have passwords scribbled on sticky notes stuck to the monitor or, worse, repeat passwords across every site. You’re better off:
Safe doesn’t mean user-hell. There’s a balance.
See, I’ve been doing this for 30 years now, and I’ve watched this industry go from physical wiring closets to cloud firewalls with thousands of virtual appliances running. And as swift as tech changes, some threats remain constant. Your best bet:
I’m excited about what’s coming next — particularly developments with machine learning and hardware security — but it’s also exhausting. Cybersecurity isn’t a theory and it isn’t a tool. It’s a mindset.
And as usual, from PSTN multiplexers to zero trust networks, I’m here at the console – coffee in hand – prepared to help you make sense out of all this change.
Stay sharp,
Sanjay Seth
Cybersecurity Consultant
P J Networks Pvt Ltd