As I sit at my desk after my third cup of coffee today (yes, that’s probably too much caffeine), I’m reflecting on how much the landscape has changed in cyber security since I first cut my teeth in the business as a network admin back in 1993. At the time, I was in charge of the network muxes for voice and data over PSTN lines. It was simpler, or so we thought. Security? Actually, we didn’t even call it that. But there was this tinge of danger, like a fizzle with a long fuse.
Fast forward to today, I’m managing my own cybersecurity firm, advising clients to navigate the intricate nature of modern threats. Up until just recently, I’d closed out work with three banks modernizing their zero-trust architecture — a world away from those old PSTN times. Oh, and I just returned from DefCon; I am all about the hardware hacking right now. It’s hard to beat Q&A with the greatest hackers on the planet as a way to remind yourself why this job is never dull.
It’s easy to spew buzzwords or grab a hold of flashy marketing terms — AI this, zero trust that. But here’s the thing: as I lived through gut punching early internet worms and how we’ve transformed into today’s threat landscape, I learned what works and what’s all hoopla. Consider the Slammer worm: I recall its worldwide explosion through the Internet back in January 2003, attacking SQL Servers worldwide as if it were a giant tsunami, and at Internet speeds. It served as a wake-up call that resulted in serious lock downs on my networks back in the day — stuff I still consider when architecting modern defenses.
And let’s be real, all the fancy shmancy dashboard stuff does not substitute for cold, hard experience. Knowing how attackers think, where they tend to poke, and how infrastructure actually behaves under attack is not something that can be faked. It’s like you’re trying to tune up a classic car and you don’t have any idea what the roar of the engine sounds like — you just don’t get it.
Assisting three banks with zero trust migrations was an eye opener. Everyone yammers on about zero trust as if it were a checked box on a compliance form — nope, it’s a mindset shift.
These were places with legacy systems — you know the sort — monoliths stuck together with duct tape and prayers. They yearned for better segmentation, identity verification on steroids and more granular access controls. The result?
But zero trust isn’t just about tech. It’s also about culture, process and buy-in from all stakeholders. If your users think zero trust is a pain, then you’ve already lost the game.
I can still recall spending nights swapping voice and data muxes over PSTN lines –– the means of communication before the days of broadband. These legacy systems turned out to be surprisingly robust — but they also didn’t have a care in the world about today’s threats.
When Slammer struck, networks seized up in minutes. I’ll never forget the panic of seeing systems grind to a crawl. That worm took advantage of a known SQL server vulnerability — a reminder that patching and defense in depth aren’t buzzwords, they’re life savers.
That experience changed the way I think about risk:
Passwords. Oh boy. I’ve lost track of how many organizations I’ve seen requiring an abstruse password — and then users write it on a post-it or enter the same old tired passphrase again and again.
Here’s the truth:
A strong password complexity requirement that doesn’t have any good support just ends up frustrating people — and that tends to be the enemy of all good security.
What I would rather you do:
Your security is only as strong as its weakest link — and often enough, that’s poor password hygiene.
So I just got back from the hardware hacking village at DefCon, and it was awesome. Look, we all love software vulnerabilities — but the physical is where attackers can sneak sometimes and before you know it they’re wrigglin’ all up in your business.
I’ve seen everything from RFID relay hijinks to clever side-channel leaks on devices that were supposedly secure. It reiterated a key point that:
Because, for all those PSTN mornings to zero trust nights, all these years later, I’ve learned something: Cybersecurity is less about striking silver bullets and more about constantly implementing smart practices. Whether it’s the basics such as firewalls, managed NOC services, routers and servers, or endpoint protection, there is no substitution for the basics!
Remember:
I’d be lying if I said I didn’t miss a million things the first time (or the hundredth). But every stumble, worm infestation and sleepless night makes every success all the sweeter.
Keep your eyes peeled, stay curious — and keep the coffee flowing.