No Title

Insights From Nearly 30 Years in Networking and Cybersecurity

I am writing this after my third cup of coffee today — forgive me if I get a little more rambly than usual. The thing is, I’ve been in networking and cybersecurity for nearly three decades at this point… and sure as hell some of it ain’t textbook theory.

I began my career way back in ’93 as a network admin. Have all of that old crap using multiplexers moving voice and data over public switched telephone network lines, where the God awful modem handshakes were like music to your ear — at least I seem to remember it. A lot has changed, but some core principles just refuse to do so.

The Evolution of Network Security and The Slammer Worm

Consider the Slammer worm from the early 2000s. It zipped across networks like an STD at a teenagers’ party. I remember watching full systems freeze over night, users wanting to know if the Internet had been broken (Hint: no, but close enough). It was a stark reminder of how tenuous network security is, even when you think everything is locked up tight.

Embracing Zero-Trust Architecture in Financial Security

Finally, I run my cyber security consultancy — P J Networks Pvt Ltd and have been bustling lately helping 3 different banks to upgrade their security infrastructure with Zero-Trust architectures. If you are not already fully aware of it, and I mean this with emphasis: nothing; absolutely nothing in your environment — inside or outside the network perimeter — is trusted by default. And honestly? It’s not just buzzword bingo. It is the only sane response to the modern threats.

My Experience at DefCon and The Rise of Hardware Hacking

Am fresh in from DefCon — yeah, the Vegas one. I am still in hype, especially for the hardware hacking village. And when they were, it became utter playground for hackers everywhere—folks breaking down everything from ancient routers to how you can mess with IoT device till your smart toaster frightens even you. That leads me to my larger point: if you believe that software is your sole security worry, you are seriously illusional. Also keep in mind that sometimes, vulnerability means physical openness.

Quick Take:

  • Internal networks are no longer safe
  • Zero-trust is a difficult concept, but one that absolutely must be taken into consideration.
  • Hardware hacking is an increasing thret vector a lot more serious
  • Old cars never die, but need regular maintenance to avoid a stall when you least expect it.

Security is People, Processes, and Technology

But hey — security is not only technology, it is also people and processes. I have seen companies spend millions on new firewalls and fancy SIEMs while their users are publicly displaying bad qwerty passwords. (and don’t get me started on how long these companies keep reusing the same ridiculous password policies — if you currently rotate your password every 90 days without any other improvements, you’re just wasting your time). Here is a bit of a rant for ya: no more “complex” passwords that nobody can remember; train your users, or better yet, use multi-factor.

Zero-Trust Explained: Beyond Access Blocking

Zero-trust? More than just blocking access. That means strong identification check of each step, restricted network segmentation as well as monitoring; who is doing what — always? And I helped those banks in rolling it out by —

  • Define Critical Assets and Data Flows
  • Prescription: — Decompose Monolithic Networks to Microsegments
  • Explicitly verifying each request- Making the user login every time
  • Behavioral analytics: identifies anomalous activity (skeptical again when you see AI-driven; a lot of vendors brand themselves as using AI, but it lacks true depth)

Network Security Analogy: Think of Your Network Like a Car

This is actually an analogy I use all the time: your network is like a car. You would not only lock your doors but leave the engine running with keys in the ignition, yes? Even then, there are many who trust those users once they get inside the perimeter. Think of zero-trust as requiring a password to enter your car every time you start it. Annoying? Maybe. Safer? Absolutely.

The Reality of Implementing Zero-Trust

Spoiler Alert: zero-trust is not plug-and-play. It is time (and cost, frankly, and a sense of patience; acquirable but perhaps the hardest for many to get). Security consultants who will promise overnight transformations. I learned pretty quickly to explain to clients: put it all together wholesomely, or you may well be actually opening in regard to bigger outages and possibly security holes.

Hardware Hacking and Its Serious Security Implications

Something else that surprised me at DefCon was the sheer inventiveness in hardware hacking — side-channel, shenanigans or the like. These aren’t just academic exercises. The banks I work with? So then, they ask: and the routers, switches, servers? Is this a physical rogue device that someone actually plugged in? Of course they can! The blind spot here is that often companies/individuals underestimate hardware risks — by far the biggest issue!

Pragmatic Security Checklist for Businesses

  • Keep everything up-to-date and patched, including your point-of-sale (POS) systems
  • Physical Access to key network hardware should be limited
  • Employ tamper-evident seals or control around hardware requirements
  • Socially engineer your staff – breaches often start with people – Do not underestimate the potential of a physical break-in and theft due to human incompetence

Some industry folks snort at this — Hardware hacking is niche. But I disagree. Each day, the attack surface continues to expand. Your defenses better be just as flexible…

On AI, Automation, and Security

At this point, many might be curious about automation in security — AI and ML are all the rage no? I’m cautious. To be clear, the automated alerting/ anomaly detection is critical. When the security is powered by AI — this is also almost always pure marketing hype. You could very easily be deceived into supporting a fancy signature-based tool by its label, but without really knowing what is under the hood.

Final Thoughts From Decades of Experience

So there you have it; I survived the shift to cloud-native infrastructures and dial-up networking, saw malware evolve from pranks to sophisticated threats, and worked for thousands of hours with businesses (including banks) in ensuring their data stayed secure. Here’s my advice, distilled:

  • Don’t get complacent. Your perimeter isn’t the same
  • Zero Trust: Lean In, but Know This is More of a Road to Travel Than a Switch to Flip
  • Do not forget about physical, and hardware security are optional
  • Teach your employees + rethink these password policies
  • AI: Don’t believe the hype; learn about it

Consulting on my own has been amazing but it’s also been difficult. I swear I eenm ac recording one of these Senten — Enjoy the rant and gaff on me down in comments, some days is like Im stillo chasing threats that dodged me back in 03. Sorry, past me.

Continuous Cybersecurity: A Never-Ending Tug of War

Finally, cybersecurity is not a place — it’s a never-ending tug of war. It’s like adjusting the carburetor on a vintage car — you modify this, replace that to keep it running down the highway. This is your whole business, of course, except car.

Stay safe out there.

Sanjay Seth
Founder, P J Networks Pvt Ltd

P J Networks Pvt Ltd cybersecurity image

Leave a Reply

Your email address will not be published. Required fields are marked *

Categories

Let’s Talk About How Can Help You Securely Advance

Get A Free Quote