No Title

Transitioning from PSTN to Zero Trust: Learnings from the Trenches

And here I am now, like third coffee-into-me sitting at my desk — Still vibing off that recent DefCon trip (hardware hacking village? Mind-blowing stuff—more on that later). Been doing this cybersecurity thing since the early 2000s But that was far from the beginning of my path— that would go back to ‘93 as an admin. Yup – those same days that I was fighting PSTN muxes trying to get voice and data to play nice together. Sometimes I miss simplicity — unless you count Slammer worm, which was when things were low point, I think, balance wise.” Anyway, enough nostalgia. Here’s a dose of tough love on security, zero-trust and why your shiny AI-powered security tool just might not be the miraculous salve you think it is.

Transitioning from PSTN to Zero Trust: Learnings from the Trenches

Getting into administration of networks in 1993 was a world where security was really not built in. You wired up routing and crossed your fingers. Firewalls? They were as a fancy feature for enterprise networks, with few people actually understanding them. Now, let’s fast forward to 2003, but what comes crashing down was Slammer worm, an eight-inch data bomb showing us all vulnerability can happen at the speed of light. I remember spending the night patching servers in a server room with my hair standing on end just to keep the worm from jumping the perimeter.

Skip forward some more, and I’m running my own company, which is heavily focused on cybersecurity — but not forgetting your roots. I’ve just completed working with three banks to completely overhaul their zero-trust architecture. And we wanna tell you, zero-trust isn’t just a buzzword you throw around in board meetings. It’s a change in mindset — a radical rethinking of what ‘trust’ looks like on your network.

Zero Trust? It’s Not Just a Fancy Firewall

With zero trust, it Is possible to trick everyone, and everyone definitely says they are doing it. But the most stumble on execution. Too many orgs slap hard MFA on it and call it a day while leaving the real estate—devices, network segments, internal traffic—wide open.”

Zero trust is never trust anything within your perimeter.

It’s petty, it’s small, it’s relentless. This means:

  • Identity confirmed every request. No session is trusted forever.
  • Least privilege access. People and devices can see NOTHING but what they need.
  • Continuous monitoring and analytics. Static policies are worthless against dynamic adversaries.

As I worked on those banks’ zero-trust upgrades, I kind of forgot how complex it can all become — particularly in old, crusty environments. Servers that should have been decommissioned years ago.”&npjefmag=e]{H’H`@servers – Those were the days, my friend.nBTTag=t_AXEM0]H<H&WQl_wsxMBpi{:I@routers – “It seems like only yesterdaynType=journal_articles&D2@1=_M^gM76ZXugdNytRumrQgyFrXfUX7xENV0G3ktr<H5OjIv9G}aN&voor=91c&publicationid=J88&hyperref=glfwf.1972.i0.hyperref&Descriptionmep=STYPE=1&T3=46H15`04!zq<LscgiDC27aROP/j300~v&)journalsearch_csv=JournalTitleMep%20Archive?cas_issn=STG_00381709_153STGDPFelementUrl_v=STG_00381709_153STGDPFelementUrl_ec=STG&cookieSet=1&cookie=32UK&type=0&pos=H&type=0&ref=Type%3Djournal_articles&D2@0=_M^RBjBWWA_af3NJLngUt1gh25aZs8uKmGvZy&voor=91c&publicationid=J88&hyperref=glfwf.1972.i0.hyperref&Descriptionglfwf=gle: journal articles&voor=32UK t\xaaouters, noisy firewalls and servers that should have been turned off years ago.

DA3.00113.nii30177.servers – Those were the days, my friend. The trick? Incremental deployment. Don’t try to boil the ocean. Map your crown jewels, and secure those first.

DefCon and the Hardware Hacking Village: It’s still not safe on the street or at home

Just returned from DefCon, and I had to share – if you ever want to have your mind absolutely blown, the hardware hacking village is where it’s at. For hours, I watched pimpled people disassembling old routers and embedded devices, making the case that security by obscurity had been taken out and shot. (Yes, even your swanky IoT gizmos are vulnerable if you’re leaving debug ports open or have not changed the default passwords — but that’s a rant for another day.)

Here’s an item from the village:

The devices are like cars; you would not drive without being able to lock the doors and windows. Everything is an Equal Network Gadget.

Once there is physical access, it compromises you that no other firewall or AI algorithm can protect you from. And that’s why operating a full-service managed NOC with hands-on checks beats a software-only model.

New Issues with Password Policies – A Necessary Evil (But Please, Make the Madness Go Away!)

If I had a rupee for every time I’ve been told “our password policy needs a symbol, a number, an uppercase, a lowercase, a smoke signal”…I could buy my coffee in gold mugs. Honestly, here’s my unpopular opinion: having complex password policies often weakens security because users will either write them down or use something as easy-to-guess pattern.

My advice?

  • Prioritize passphrases over passwords. Think: ‘Sushi4Lunch@noon’ beats ‘P@55w0rd!’. Easier to recall, more difficult to hack.
  • Use MFA religiously. Passwords are just one layer.
  • Implement enterprise password manager. Quit asking users to be human vaults.

And no, changing passwords every 30 days? That’s a dated taxi (pun intended) from the ’90s. Do not rotate your position unless you believe you have been breached.

Some Hard-Won Tips for Keeping Your Network Secure (From a Guy Who Knows)

  • Segment your network rigorously. Just don’t have everything talk to everything else. Think highways and toll booths — not a parking lot with no gate guard.
  • Patch your firmware regularly. All of these router vulnerabilities are not ghost stories, they’re real.
  • Monitor logs, but realistically. Turn on meaningful alerts. Don’t drown in noise.
  • Train your users. The weakest link in this chain is more often the earnest employee who clicked the wrong thing.
  • Skepticism is your friend. Particularly around new “AI-powered” security products. The hype is for real, but so is the overpromise.

Quick Take: What You Need To Know Today

  • Zero trust isn’t a checkbox, it’s a mindset change in how you think about access and trust.
  • Hardware security is often the forgotten cousin — but it matters.
  • Password policies don’t have to be a form of torture.
  • Legacy Systems are your biggest challenge — Plan upgrades judiciously.

Automated tools are wonderful, but never substitute for human intuition.

Wrapping Up—Lessons from the Decades

Reflecting on my career from the days of setting up networks to the days of managing P J Networks Pvt Ltd, the theme that “the only thing certain is change” is the singing anthem. But some things are hard to change, threat actors evolving, users erring and technology which so often promises silver bullets but never quite delivers alone.

Remember, cybersecurity is not just about tech—it is a game about people, a game about mindset, and a game about hustling all the time.

So, whether you’re just dipping a toe into zero trust, dealing with legacy gear or contemplating your next firewall upgrade, here’s what you should do: stay curious, stay skeptical and keep learning.

After all, the day we stop asking questions is the day we cease to be safe in our networks.

And now if you’ll excuse me, I need to go figure out my next coffee — because the life of the job is never done.

—Sanjay Seth, P J Networks Pvt Ltd

Hardware Hacking at DefCon
Hardware Hacking at DefCon

Leave a Reply

Your email address will not be published. Required fields are marked *

Categories

Let’s Talk About How Can Help You Securely Advance

Get A Free Quote