Your Security Stack is Likely Out of Date—Here’s Why and What to Do About It
I am freshly back from DefCon and still reeling from the hardware hacking village—if you’ve never see a smart lock be bypassed in under 60 seconds, you need to. But while the conference was entertaining, it also served as a painful reminder: most organizations, even those that believe they are secure, are not.
I’ve been doing this for decades now. I went into IT in ‘93 as a network admin and secured a network meant don’t unplug the cables. I saw Slammer up close, I worked on mux that connects voice and data over PSTN, and today, I run my own cybersecurity company, helping businesses (including three major banks) build out real, modern security architecture. And yet, again and again, I watched companies make those same mistakes—believing they’re covered because they put in a firewall five years ago and added MFA. They’re not.
Quick Take
So if you’re crunched for time (which, let’s face it, you likely are), here’s the tl;dr:
- Your firewall isn’t enough. If all you have is perimeter-based security, you’re in deep trouble.
- Zero Trust is not a buzzword—it’s a necessity. Everything is enemy until proven otherwise.
- Patch. Your. Stuff. No seriously, I shouldn’t have to say this in 2024.
- AI-powered security? Be skeptical. AI isn’t magic, and much of these solutions are fancy regex with a side of marketing made-up.
- Passwords still suck. But until passkeys and FIDO2 become mainstream, you need to hammer down on strong credential policies.
If you have a few moments, let’s dive into why so many businesses are doing security wrong — and how we fix it.
Your Firewall Is Not Enough (Not Even Close)
I love firewalls. I love my seatbelt too — but I don’t expect it to protect me if I drive into a wall at 100km/h. Perimeter security (your firewall) used to be the gold standard. Prevent intrusions, pretend it’s only ingress and egress, move along.
But here’s the truth: attackers are not coming through the front door as much anymore.
- They’re trick your users into surrendering credentials.
- They’re taking advantage of misconfigurations in your cloud environment.
- They are using your own infrastructure against you (living-off-the-land attacks).
An attacker with valid credentials will not be deterred by a firewall. It won’t prevent a misconfigured S3 bucket from leaking sensitive data. And it sure as hell won’t prevent an insider threat (malicious or just careless).
This is why contemporary cybersecurity strategies must look outside the perimeter — toward endpoint security, network segmentation, multi-factor authentication and behavioral monitoring, to name just a few.
Zero Trust is Not Optional Anymore
The other day I assisted three different financial institutions in their transition towards a Zero Trust security posture. None of them were terrible on security at the beginning but still had far too much trust implicit within their networks. That’s a problem.
Zero Trust is not just a buzzword — it’s a mindset change. It means:
- Treat everyone and everything like a wild card.
- Validate all the time — pre-authentication, post-authentication, pre-execution of code, pre-network traffic
- Apply principle of least privilege—only grant employees, applications and devices access to what they need and nothing else
But Zero Trust will make everything less efficient, right? Perhaps for the first few weeks. But compromise is expensive — to you financially, reputationally and operationally. Adding a few verification steps is a small administrative cost compared to the cost of a breach.
Patch. Your. Stuff.
I shouldn’t have to say this in 2024 but here we are. When I do a security assessment every time I get:
- Unpatched VPN servers
- Outdated libraries used by web apps
- Systems reaching EOL that are still in production (like, why? seriously, why?)
Slammer was one of the fastest-spreading worms in history, and it spread almost single-handedly because admin power users had not patched their Microsoft SQL Servers. That was 20 years ago! But unpatched vulnerabilities are still sitting in enterprises.
I understand — flashing isn’t exciting. It’s disruptive. It breaks things sometimes. But you know what really brings things down? A ransomware attack locking up your whole network.
The AI Security Hype Train—Take It with a Grain of Salt
There you have the marketing: AI-based security solution detects threats at the time! Sounds great, right? Except the majority of these tools are:
- Traditional systems that are overhyped and act based on apparent and signature-based detection.
- False positives from behavioral analysis tools that swamp real alerts.
- Not magic but genuinely good—AI can assist, never supersede, fundamentally good security practices.
I like AI. I think it has potential. But I’ve also seen companies invest in AI-driven security under the impression it would solve their problems—only to be breached because their basic security hygiene was garbage.
Password Policies Still Suck (But We Still Need Them)
This is where I give my standard rant.
Passwords are the worst security mechanism. People reuse them. Pick bad ones. Write them down. And even so, we depend on them.
In every security audit I do I find:
- Password123 (or even worse, Spring2024!)
- Admin passwords for mission-critical systems
- No multi-factor authentication enabled, it’s irritating
Passkeys and biometric authentication are improving, but until the world transitions to working without passwords, you need to enforce good policy:
- Not reusable in applications. Ever.
- Get a password manager (for real, stop trying to remember them).
- Everywhere (yes, everywhere) requires MFA.
What Now? (A Simple Action Plan)
All right, but how the hell do you go about actually remediating your security posture? Here’s a start:
- Take an inventory of your existing security stack. What tools are you using? What’s outdated? What’s misconfigured?
- Adopt a zero trust model. Presume no implicit trust, apply least Privilege, be certain before allowing access.
- Patch vulnerabilities ASAP. Not next quarter, not next patch cycle—ASAP.
- Reassess your firewall rules. You deployed that rule set five years ago, I guarantee it’s stale.
- Train your users. Security awareness is not an option—it is a requirement; your employees are your weakest security link, and your strongest.
- Review your authentication policies. MFA everywhere, strong passwords, and start planning your passwordless future.
- Of course, be suspicious of security solutions that work magic. AI is helpful. It’s not a silver bullet.
Final Thoughts
Cybersecurity is not a box to be checked — it is continuously working against shifting threats. I’ve watched organizations with multi-million dollar security budgets burn themselves to the ground because they got lazy about patching. I’ve watched startups with a shoestring budget remain secure because they did the fundamentals right.
All you can do at the end of the day is be resilient. There’s no such thing as absolute security. But maintaining your systems hardened, your users trained, and your strategy evolving? That’s how to stay one step ahead of the next threat.
Now, time for another coffee.
