Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Korea Expands SME R&D Into Protection and Uncommon Earth Provide Chains – KoreaTechDesk

March 15, 2026

Mohammed Rasool Khoory & Sons Contributes AED 1 Million in Assist of the “Mom of the Nation Endowment for Orphans” initiative

March 15, 2026

A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It

March 15, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Korea Expands SME R&D Into Protection and Uncommon Earth Provide Chains – KoreaTechDesk
  • Mohammed Rasool Khoory & Sons Contributes AED 1 Million in Assist of the “Mom of the Nation Endowment for Orphans” initiative
  • A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It
  • New Siri, Liquid Glass controls anticipated for WWDC 2026
  • With 2 factories within the Amazon, this biz sells 1 bil Brazil nuts/yr to 45 international locations
  • REVIEW: Gozney Arc Lite, prepare dinner 12″ pizzas in a conveyable pizza oven that weighs simply 12kg
  • Zari-Zardozi: women-led stitching networks and home-based craft
  • Zhipu AI Introduces GLM-OCR: A 0.9B Multimodal OCR Mannequin for Doc Parsing and Key Data Extraction (KIE)
Sunday, March 15
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It
Cybersecurity & Digital Rights

A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It

NextTechBy NextTechMarch 15, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It
Share
Facebook Twitter LinkedIn Pinterest Email


COMMENTARY

When you stroll the expo flooring at any of the Black Hat or RSAC Conferences, the trade tells you the long run is right here. It is all quantum-resilient encryption, AI-driven safety operations facilities, and cloud-native architectures.

Then, I am going again to my day job.

With over 20 years of expertise spanning federal authorities, non-public manufacturing, and enterprise safety, I’ve seen the trade from each angle. In my present twin roles —advising Fortune 100s as a area CISO and defending a significant US metropolis as a sitting practitioner — I spend half my time discussing the “innovative,” and the opposite half defending the “rusting edge.”

The soiled secret of essential infrastructure and American manufacturing is not that we’re “behind” on patching. It is that we’re working the spine of our economic system on techniques the place “patching” is bodily inconceivable.

I’m speaking about operational know-how (OT) and programmable logic controllers (PLCs) working on Home windows 95 or customized DOS kernels. I’m speaking about controllers the place the seller dissolved 20 years in the past; the supply code was misplaced in a merger; and the engineer who hard-coded the logic died in 2005.

Associated:A CISO’s Playbook for Defending Knowledge Belongings Towards AI Scraping

There is no such thing as a toll-free assist quantity. There is no such thing as a GitHub repository. There’s only a blinking inexperienced gentle that we pray by no means turns purple.

The Physics of Patching

This is not a case of laziness: It is a case of physics and CapEx [capital expenses].

Within the IT world, when a server reaches end-of-life, you spin up a brand new VM. Within the OT world, that “server” is a PLC bodily cemented into the facility plant’s basis or hardwired into the chassis of a hydraulic press.

Changing that $5,000 controller would not price $5,000.

  • In manufacturing: It means halting a manufacturing line that generates $50,000 an hour to tear out and rewire the “nervous system” of the manufacturing unit flooring.

  • In utilities: It means utilizing heavy cranes to hoist out a turbine generator put in earlier than the web existed.

  • In municipalities: It means digging up a significant metropolis intersection to succeed in a sewage elevate station buried 20 toes underground.

I’ve seen improve quotes for a single manufacturing line hit $10 million, not for the {hardware}, however for the development, re-certification, and downtime required to put in it.

So, the CFO says “No.” And the CISO is informed to “make it work.”

The “eBay Provide Chain”

This results in a actuality that might terrify the common client: The eBay Provide Chain.

I’ve personally helped manufacturing and municipal purchasers scour eBay for particular management modules that have not been manufactured for the reason that Clinton administration. We aren’t searching for antiques, however for the precise I/O playing cards wanted to maintain the water working or the meeting line transferring.

Associated:How Can CISOs Reply to Ransomware Getting Extra Violent?

I do know of purchasers who actively monitor chapter filings, not for market intelligence, however to scavenge elements. When a manufacturing unit shuts down, they purchase up the legacy controllers, refurbish them, and put them into chilly storage. We’re cannibalizing the previous to outlive the current.

Securing the Un-Securable

We’re tasked with securing this “zombie” infrastructure towards nation-state actors armed with fashionable weaponry. We can not set up fashionable endpoint detection and response brokers on these PLCs. They might crash the kernel. We can not scan them for vulnerabilities. A easy nmap scan can knock a legacy SCADA system offline.

We’re pressured to construct a digital fortress round a corpse. Right here is how we do it in the true world:

  • “Digital Concrete.” True Segmentation VLANs usually are not sufficient. In case your legacy OT community can “speak” to the company IT community through a easy rule, you could have already misplaced. I counsel purchasers to make use of “Digital Concrete,” strict, hardware-based firewalls, or information diodes that enable site visitors to movement in just one route. The OT community ought to seem as a black gap to the surface world: Telemetry comes out, however nothing goes in.

  • Monitoring the wire, not the endpoint. Since we will not put an agent on a 30-year-old controller, we’ve to look at the wire. We use passive community monitoring to determine a baseline for “regular.” If a PLC that has spoken to the identical inside IP tackle for 15 years immediately tries to speak to a server in a distinct subnet, that’s your alarm.

  • Bodily safety is cyber safety. When digital locks fail, bodily locks should maintain. I’ve seen assessments the place we bypassed a million-dollar firewall by strolling into an unlocked utility shed and plugging a Raspberry Pi right into a change. In case you are working legacy gear, your bodily perimeter with fences, locks, and cameras turns into your main firewall.

Associated:2025 Was a Wake-up Name to Defend Human Selections, Not Simply Programs

The Actuality Verify

We have to cease shaming organizations for having legacy tech and begin serving to them safe it.

The water pump down the road from your own home, the manufacturing unit making your automobile elements, and the grid powering your workplace are seemingly counting on the “eBay Provide Chain.” We can not patch our approach out of this.

The man who wrote the code is gone. The seller is bankrupt. The {hardware} is out of date. However the mission — holding the lights on and the water clear — stays.

As safety leaders, our job is not to complain concerning the rust. It is to ensure the rust would not turn out to be a breach.



Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s developments at the moment: learn extra, subscribe to our e-newsletter, and turn out to be a part of the NextTech group at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Veeam Patches 7 Essential Backup & Replication Flaws Permitting Distant Code Execution

March 15, 2026

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Throughout 163 Nations

March 14, 2026

9 CrackArmor Flaws in Linux AppArmor Allow Root Escalation, Bypass Container Isolation

March 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Korea Expands SME R&D Into Protection and Uncommon Earth Provide Chains – KoreaTechDesk

By NextTechMarch 15, 2026

South Korea is pushing its SME innovation coverage deeper into strategic industrial territory. The federal…

Mohammed Rasool Khoory & Sons Contributes AED 1 Million in Assist of the “Mom of the Nation Endowment for Orphans” initiative

March 15, 2026

A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It

March 15, 2026
Top Trending

Korea Expands SME R&D Into Protection and Uncommon Earth Provide Chains – KoreaTechDesk

By NextTechMarch 15, 2026

South Korea is pushing its SME innovation coverage deeper into strategic industrial…

Mohammed Rasool Khoory & Sons Contributes AED 1 Million in Assist of the “Mom of the Nation Endowment for Orphans” initiative

By NextTechMarch 15, 2026

Mohammed Rasool Khoory & Sons has contributed AED 1 million in help…

A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It

By NextTechMarch 15, 2026

COMMENTARYWhen you stroll the expo flooring at any of the Black Hat…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!