So here I am – third cup of coffee, barely any sun up, tapping out on the keyboard remembered musings of what threats looked like when I began in ’93 as a network admin and how they’ve changed to where we are today. Yeah, those were the days – routers shouting with voice and data muxed over PSTN connections, dial-up sounds that made your ears explode, all the while muttering to oneself “How on earth can this scale?” Fast forward to today. I am founder of P J Networks Pvt Ltd-a Cybersecurity firm but still the same old guy interested ( sometime not!) in fast changing world of IT Security. Just returned from DefCon—still amped up from the hardware hacking village—and I want to rap about zero trust architecture. Spoiler alert: it’s no mere buzzword.
I began in the trenches, keeping networks running on PSTN lines, watching the Slammer worm in action. Remember that chaos? It was easier to ask for forgiveness once Slammer busted through all defenses like a bull in a china shop. That moment taught me something essential: Security is not static. It can’t be. It has to be responsive, evolutionary and anticipatory.
Zero Trust is not simply trust no one in some Orwellian way. It’s really more about never, ever assuming a safe network environment.
So many organizations have the approach that security is like you need a fortress wall and your firewall’s the wall. But here’s the news: That wall’s got gates and windows, and it has a big open door.
Zero Trust means:
The problem is that it’s more difficult than it looks. But when I recently assisted three banks with the implementation of zero-trust architectures, it was painfully apparent that a lot of organizations are nowhere near ready. Here’s a brief overview of what happened.
Banks are a great place to start zero trust because the stakes are insane. We addressed identity verification, endpoint security and network segmentation—those are all traditional zero-trust pillars.
But here’s what stood out:
One bank was attempting to roll out fancy AI-driven security tools. I respect innovation — but I’m skeptical about anything that simply calls itself AI-powered without these bedsrock go-to-market promises about transparency. If you’re confused about the logic, it’s equivalent to giving your car keys to a robot who has no driver’s license.
Bottom Line: Zero trust is a mix of technology, process and culture change. It’s not as if you can simply purchase software and call it a day.
Just returned from DefCon, and the hardware hacking village was a treasure trove or information. It was a reminder that the physical denial side can be forgotten in the security world. You can have a fortress of code but a window through the hardware.
One demo? How a super simple USB device could get around corporate security measures. It’s a bit creepy — and yet so obvious if you think about it.
Security is like a car’s brakes. The software is your ABS and traction control, but if your tires are threadbare and your brakes are leaking fluid, no amount of techno-pop equipment will save you.
If you’re pressed for time, here’s espresso-shot my summary:
Some of what I’ve learned you might find useful (typed by a grizzled network admin).
I’ve made mistakes. Worms like Slammer would hit me faster than I had expected in the beginning of my career0 I was under the impression that ISO standards were sufficient. Spoiler: they’re not.
Now I know that cybersecurity is a marathon, not a sprint. A fast course that is always changing. But that’s part of the thrill of it.
In lots of ways, cybersecurity today smacks of the old days of PSTN— constant adjusting, fixing and riding the seesaw allocating resources between voice and data traffic. Except now, the stakes are greater still.
Look, every company has a network. Every network has vulnerabilities. The equivalent of running a race with one shoe laced behind your back is being negligent about zero trust.
Nowadays, the amount of ransomware, insider threats, and sophisticated nation-state actors extenuates, existing around the perimeter. And that’s why it’s not a good idea to think of zero trust as a silver bullet but as an obligatory step in development. That’s why it’s all brought to the table by P J Networks Pvt Ltd:
We, sometimes, are too paranoid, but the cybersecurity issue is such that it develops so swiftly and dynamically that when someone tells you that he’s one step further with BEC-solutions, you can be sure there is cause for concern. I’ve been nearly 30 years in for so long to say cybersecurity is still about people. There is a security culture that can matter along with your awareness. Get your network well-segmented, your firewalls tightly secured, your suspicious attitude over fusty vendors, and brew another cup.
Best wishes from the desk,
Sanjay Seth
P J Networks Pvt Ltd
Still buzzing from DefCon and everything to get the better of whatever’s next.