Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

What modern cybersecurity can learn from ancient adversaries

By Chris Roberts
cyber freepik

<a href="http://www.freepik.com">Designed by starline / Freepik</a>

March 2, 2021

With increasingly sophisticated attacks on targets of opportunity, how can enterprises ensure they are doing everything possible to safeguard against cyber threats? Surprisingly, we can apply techniques used to fend off enemies throughout ancient history by emperors, warriors, and soldiers to our high-tech environments of today. 

If we look back at the trials and tribulations throughout history, we’ll discover many parallels between the Medieval world and our own when it comes to strategic invaders, attackers, and threats on vulnerable civilizations. Leaders can use these teachings to create strategies and processes to pinpoint and identify cyber threat attempts; implement unique methods to protect against the evolving threat matrix; and understand how to best protect their intellectual property, financials, and data from attacks.

Below, we’ll examine three civilizations’ decision making and how we can integrate their best practices into modern-day security strategies.

 

Ancient Egypt 1210 BCE: Convenience over security causes problems

In ancient Egypt, pharaohs had monumental requests and a “just do it” attitude. This “delegation and denial” cycle (which led to coup attempts) is something replicated in executive attitudes towards cybersecurity today.

There is a major convenience over security problem in many businesses, which creates the perfect opportunity for an attacker to enter. For example, there are many excuses including ‘It’s too much hassle to change the password’, ‘We need to have guest account for visitors,’ and ‘It's too hard to change users to protected groups.’ Other bad habits include always logging in with the default admin account, having autologin enabled, and using the server operator account. These bad habits, have, over the years cost those we protect billions of dollars,  if not, in some cases an organization’s entire business.

Best practices: Do not choose convenience over security. Organizations must manage AD delegations to follow the principle of least privilege. The logic being that privileged accounts are often easier to hijack. Organizations should ensure that the right user are in the right place, at the right time and therefore only have access to objects they are supposed to. In addition, audit any changes to accounts that have any kind of elevated privileged access.

 

Shang (Or Yin) Dynasty 1122 BC: People, process, and technology work together - or not at all

The Shang (Yin) Dynasty, known for their advancements in government, writing, and tactics, demonstrate that procedures and controls are just as important as our actions. The key takeaway for organizations today is that they need to ensure that people, process, AND technology work effectively together towards a solution. If we could manage efficiency and clearly communicate with all those around us, we likely wouldn’t have as many cyber-attack issues. In other words, it is not effective to only train users once a year and expect them to remember things. It’s crucial to provide the people protecting an organization’s network with sufficient training and education. If they don’t have the resources, we shouldn’t be surprised when things don’t go the way we expect.

Best practices: Organizations must be mindful of how they execute privilege escalation. Considerations include:

  • Changes to default domain policy
  • Changes to the default domain controller policy
  • Changes to GPO linking

 

Assassins 1275: Resilience is non-negotiable

The Assassins targeted invasive attacks against strategic targets. From them, we can learn that when using deceptive techniques, typically, a smaller, trained, armed and motivated attacker will succeed against a larger, less mobile foe. Attackers take advantage of hard times, and in order to have digital resilience, organizations need to shine a light in the shadows and have the ability to see these threats before they get in.

Today, data and identities are scattered all over the place and technology is advancing at a pace organizations can’t keep up with. The global average for identifying a breach is upwards of 197 days after someone has entered, rummaged around and likely already long since left. Recovery of a breach after it’s been identified adds an additional 2 months to that timeline, if you are able to retain an incident recovery team in these increasingly busy times. Unfortunately, within that entire timeframe, a huge amount of damage can occur. For example, DC Shadow empowers attackers (with admin rights) to spin up fake Domain Controller that can quickly distribute changes to legitimate DCs using normal replication mechanisms. Without any cyber resilience put in place, organizations won’t have the ability to see this happening, potentially leading to major damage.

Best practices: Organizations should implement effective network separation, segmentation, and admin tiering to constrain access.

With no perimeter or true understanding of how vulnerable our powerful systems are, it shouldn’t come as a surprise when adversaries and attackers obtain access to a company’s sensitive information—yet somehow it still does every time. It’s time for our community to learn from history’s mistakes and adjust our resilience approach before it’s too late.

KEYWORDS: cyber security hackers incident response perimeter security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris Roberts is Hacker in Residence of Semperis.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber resilience through deception: What businesses can learn from federal cybersecurity frameworks

    See More
  • Laptop and monitor

    Frontline lessons: What cybersecurity leaders can learn from attacks

    See More
  • 5 minutes with Passwaters

    5 minutes with Jason Passwaters - What cyberthreat intelligence can learn from the military

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • Optimizing Social Media from a B2B Perspective

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing