It’s just a little after my third coffee, and I’m sipping on it and I’m reading my email, and I’m thinking over my career which actually named back in 1993—when I was just a humble network admin, I was managing PSTN muxes for voice and data. Those early days seem like a lifetime ago, and yet there are still a few lessons that are wildly relevant today. Three decades later, I now own a cybersecurity firm and I have recently helped three banks revamp their zero-trust designs. And just last week, I returned from DefCon—still vibrating from the hardware hacking village and all the bleeding-edge chaos.
The thing about cybersecurity is this: It’s a never-ending game of cat and mouse. You believe you have your defenses calibrated, and then something like the Slammer worm comes along and shows you up instead. Yep, I recall, I remember Slammer well — right there on the front lines, as it laid waste vast sections of the internet in minutes. The slam dial-up modem noises back then were music compared to today’s lightning-fast barrages. Those worms were a wake-up call for a brand new way to defend ourselves.
Recalling the days of the PSTN, we had the voice and data multiplexers, it was like running an old symphony on analog gear. Sounds vintage? It was. But it instilled in me a profound sense of just how fundamental networks are to everything we depend on today.
Fast forward, and my attention today is on zero-trust architectures, particularly in financial institutions, where the stakes could not be higher. Lately I’ve been working with three banks to improve their zero-trust approaches, which means throwing out that old, perimeter-based mindset, and replacing it with never trust, always verify.
But — it’s not just purchase a shiny product stamped with AI-powered and hope for the best. I’m dubious about buzzword however, most AI in security today is glorified pattern matching. Not that A.I. is useless, but nor should you hold your breath for any A.I. miracles either.
DefCon’s hardware hacking village? Mind-blowing. Why? Because it made me remember that hardware security is one aspect not considered in the enterprise security. You’re pretty sure you’ve got your firewalls, servers, and routers locked down? Maybe. But hackers messing with the physical layer, whether that’s USB-based exploits or supply chain tampering, are getting more creative.
Password policies… oh boy. I don’t give a tin shit what the standard declares, you forcing users to enter 30 char long alphanumeric gibberish + 8 weird chars? It’s dumb. It annoys users – so they write it on post-its. Security teams don’t like to admit that, but complexity without usability is a fail.
Here’s what actually works:
And yes, yes, I know there are debates here. N.I.S.T.’s protocols have been changing, though corporate policies have been slow to follow.
Operating my own security company has been a crazy experience — the clients always want to hear stories, generally for cautionary purposes. Such as the time a monstrous client didn’t want to use patch management because “it could break production.” Spoiler: It did fail — but in failing to patch, they ended up paying for ransomware, which was much more expensive.
Or the time I assisted a bank migrating their firewall policy from a monolith to a microsegmented zones. It was a painful process, but once it was completed, the attacks sort of bounced off of the segmented internal network like pinballs.
If you’ve made it this far, bravo. Cybersecurity is not just a job — it’s a way of thinking that is constantly evolving. From those analog muxes in ’93, battling Slammer, to now architecting zero-trust for banks and geeking over hardware hacking, the lesson is clear: Stay curious. Stay humble. And keep sipping that coffee.
Security is complex. Sometimes frustrating. But also extremely satisfying when you see your network blocking personal attacks instead of being attacked.
And keep in mind: Your system is only as secure as its weakest device. So, patch up, segment rightly, and dissemble all you can, not out of deceit but simply to be discrete. Because in this game, the hackers are always one step ahead, but so can you.