He Quit Cybersecurity After 34 Years — Here’s Why

David Bombal
29 Aug 202522:24

Summary

TLDRIn this insightful discussion, Miko, an expert in cybersecurity, explores the growing challenges of privacy and security in an increasingly connected world. He emphasizes how data has become a commodity and how everyday devices, from dishwashers to cars, are becoming vulnerable to cyber threats as they gain smart capabilities. Miko also compares the current digital landscape to the asbestos crisis of the past, highlighting how society may one day look back at our reliance on connected devices with regret. Ultimately, he stresses the importance of setting clear goals in life, urging both young and old to actively shape their future.

Takeaways

  • 🔒 Cybersecurity has significantly improved over the last 15 years, especially with more restrictive mobile operating systems like iOS and Android.
  • 🧑‍💻 Attackers have shifted focus from technical exploits to targeting humans through phishing and social engineering due to stronger device security.
  • 🤖 AI currently provides an advantage to defenders in cybersecurity, although potential misuse by attackers remains a future concern.
  • 🚁 Drones are evolving from radio-controlled to fiber-optic and potentially fully autonomous AI-controlled systems, changing modern warfare.
  • 💀 The rise of autonomous lethal drones could have major ethical and strategic implications in the near future.
  • 📱 IoT devices increasingly go online automatically, and users have little control, making privacy preservation extremely difficult.
  • 💰 Data has become a critical asset in the age of AI, used for training models, advertising, and monetization, driving the push for constant connectivity.
  • 🛡️ Strong encryption and privacy-focused tools cannot be eliminated by law; criminals will always have access if restrictions are imposed.
  • 🎯 Personal goal-setting and actively working toward ambitions are crucial for a meaningful and successful career.
  • ⚖️ Using modern technology always involves trade-offs between convenience and privacy; complete privacy is rarely achievable without significant lifestyle limitations.
  • 📝 Continuous learning and adapting to new challenges are key to staying relevant and making meaningful contributions in technology and security.

Q & A

  • What has been the biggest security improvement in the last 15 years according to Mika?

    -Mika claims that the most significant security improvement has been the introduction of more restrictive mobile operating systems like iOS and Android, which are much harder to hack compared to traditional desktops.

  • Why are attackers shifting from technical attacks to human-based attacks?

    -As devices like iPads and smartphones become more secure, attackers find it easier to exploit human behavior through scams, phishing, and deception rather than attempting complex technical hacks.

  • What is Mika's perspective on AI in cybersecurity for defenders?

    -Mika is optimistic, stating that currently, defenders have an advantage using AI for threat detection, even though attackers could theoretically use AI for exploits. The widespread misuse of AI by criminals has not yet materialized significantly.

  • How has Mika’s career evolved over the last 34 years?

    -Mika started in 1991 dealing with floppy-based viruses, observed the rise of ransomware, banking trojans, and state-sponsored attacks, and is now transitioning from cybersecurity to drone defense to apply his skills in a new domain.

  • What are some challenges in detecting modern drones on the battlefield?

    -Modern drones can use radio, fiber optic, or AI-based autonomous controls, making them harder to detect. Defenses must now include visual detection and new technologies since traditional radio-based detection is insufficient.

  • What does Mika mean by 'internet asbestos'?

    -He uses 'internet asbestos' as an analogy to describe how connected devices are becoming ubiquitous and potentially harmful to privacy and security, much like asbestos was widely used before its dangers were understood.

  • How does Mika suggest individuals can preserve privacy in 2025?

    -Mika notes that while privacy can technically be preserved using tools like encryption and offline measures, most people choose to trade privacy for convenience when using AI, smart devices, and connected technologies.

  • What advice does Mika give to his younger self or to anyone starting their career?

    -He advises setting clear goals and actively working towards them. Without goals, people drift according to others' directions and fail to take control of their own lives.

  • What are Mika’s views on data collected by everyday devices?

    -Mika explains that data is extremely valuable, and devices will go online automatically to collect it. Manufacturers use this data for diagnostics, advertising, and AI training, making it difficult for users to maintain privacy.

  • What does Mika identify as the main challenge with connected IoT devices?

    -He emphasizes that adding connectivity to everyday devices makes them 'smart' but also inherently vulnerable to hacking, creating a persistent cybersecurity and privacy challenge.

  • Why is Mika moving from cybersecurity to anti-drone work?

    -He sees greater purpose in applying his cybersecurity skills to drone defense, especially given the current warfare environment in Europe and the evolving threats posed by autonomous drones.

  • What role does generative AI currently play in corporate cybersecurity?

    -Generative AI helps defenders detect threats and improve security measures, while its misuse by attackers remains limited. Large-scale AI-driven attacks and zero-day exploits are still mostly hypothetical.

Outlines

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Mindmap

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Keywords

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Highlights

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Transcripts

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now
Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecurityAI InsightsDrone DefenseIoT PrivacyTech TrendsData SecurityCareer AdviceBlack HatGenerative AIPrivacy RisksTech FuturismMalware Evolution