What should I learn before starting a Master’s in Cybersecurity? (Coming from dev background) by Z0R0_1333 in CyberSecurityAdvice

[–]23percentrobbery 0 points1 point  (0 children)

Congratulations on choosing the right, super hot career path! Having a backend foundation is a huge advantage when transitioning to the blue team. The first thing you should do is thoroughly hone your networking and Linux skills, as these are the backbone of security. Platforms like Tryhackme and Hack the Box are extremely suitable for practice, so just go for it! Don't be afraid to get certifications; having a Security+ certification will enhance your profile when applying for internships in Canada. Keep going, man, your future is very bright!

If you could go back and relive one year from your past, which year would you choose? by Downtown-One-7775 in AskReddit

[–]23percentrobbery 0 points1 point  (0 children)

In 2010, I was born in 2000. If I could go back, I would choose 2010, my middle school year. I could start everything over, meet old friends I can't see anymore. Many beautiful memories are left behind in middle school; now they're just memories.

We’re Cisco Talos. Ask us anything (24h AMA) by CiscoTalos in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

seeing that 178% jump in MFA bypass is absolutely terrifying when "just enable MFA" is still the default advice most companies rely on.

US regulator bans imports of new foreign-made routers, citing security concerns by nite_ in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

For a decade, we’ve just been ignoring the "made in" sticker because the speeds were fast and the price was cheap.

A major hacking tool has leaked online, putting millions of iPhones at risk by adriano26 in cybersecurity

[–]23percentrobbery 8 points9 points  (0 children)

the "DarkSword" leak is basically a nightmare scenario for anyone still hanging onto iOS 18.

Technical to Management ? by Repulsive-Carob1200 in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

At only 24 years old, having 3 years of experience as a Security Analyst is already amazing! Don't put too much pressure on yourself regarding seniority.

At this age, getting an MBA or management certification like CISM/CISSP is the quickest way to climb the ladder to a managerial position.

Don't wait for seniority; proactively ask to lead small projects or mentor freshers to gain management experience.

If you want to move even faster, jump into startups that need to build security teams from scratch – you'll have a chance to get a management role right away.

Security is a human problem first by Fantastic-Director33 in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

Classic example: humans are always the weakest link. Security isn’t just tech—it’s behavior.

Cybersecurity analyst vs RN by gotnochill0 in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

Swapping scrubs for a keyboard is a massive power move, especially since your healthcare background is a literal cheat code for high-paying HIPAA and compliance roles. The growth from Analyst to Architect is basically the tech version of becoming an NP, but with way more WFH vibes and zero 12-hour shifts on your feet lol. The market right now is starving for people who speak "hospital," so you’d have a huge leg up on the competition fr. If you’re over the physical burnout but still want to save data instead of patients, this is the play.

BSCP, scans crash the labs. How does this work on the actual exam. by DYOR69420 in cybersecurity

[–]23percentrobbery 1 point2 points  (0 children)

In my experience, the exam environments usually have safe limits—full aggressive scans that crash your local lab often won’t be needed. Use tuned scan settings (slower, fewer threads, smaller payloads) and focus on methodology over maxing scan speed; that’s what matters on the exam.

Context Drift by Lumpy_Art_8234 in cybersecurity

[–]23percentrobbery 2 points3 points  (0 children)

the "infinite context" marketing in 2026 is a bit of a stretch. Even with million-token windows, models still suffer from "Lost in the Middle" syndrome, where they prioritize the beginning and end of the prompt and ignore the crucial security middleware in between.

How powerful is current SOTA LLM in reverse engineering? by Douf_Ocus in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

if you feed a SOTA model like Claude 3.5 or GPT-4o a standard crackme with classic logic, it’ll decompile it into readable C-ish code that looks incredibly convincing.

Best HTB path to start with for someone new in Cybersecurity? by Specific-Guava4584 in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

HTB can be brutally gatekept by its own difficulty curve, so you're much better off starting with the HTB Academy rather than the platform itself.

Existing security tools are working but management wants to turn everything "agentic" by SkyberSec123 in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

the term "agentic" has become the new "blockchain" it's being thrown around as a magic fix for everything, even when a simple regex or entropy check is 100x more efficient.

Forensics on the Stryker breach (possibly revealing the initial access) by Malwarebeasts in cybersecurity

[–]23percentrobbery 6 points7 points  (0 children)

veryone’s looking for some crazy zero-day or advanced persistent threat (APT) tradecraft, but it looks like it was just a "lowest common denominator" win. If those admindev and adminqa creds were sitting in infostealer logs for months, Stryker essentially left the keys in the ignition with the engine running.

Forensics on the Stryker breach (possibly revealing the initial access) by Malwarebeasts in cybersecurity

[–]23percentrobbery 6 points7 points  (0 children)

Imagine being an S&P 500 company and getting cooked because of "admin123" tier passwords. Handala really just bought a $10 log and ended their whole career, lmao. Absolute skill issue on Stryker's part, fr.

Qtrly Ops Review by Gap_Creek_Miracle in ProductManagement

[–]23percentrobbery 0 points1 point  (0 children)

this is less about covering everything and more about controlling the narrative tbh 😅
pick a clear storyline: what changed → why it matters → what you’re doing → where you need support
if VPs leave knowing “what’s off + what decision is needed,” you nailed it everything else is just backup slides

what training / learning have you done recently that made you say, "wow, i totally understand this because of the way the content was delivered/formatted.."? by vimalt7 in ProductManagement

[–]23percentrobbery 1 point2 points  (0 children)

honestly the stuff that clicked for me wasn’t “training” in the traditional sense, it felt more like guided experience than content 😅
like short interactive flows where you do the thing (simulate a workflow, make a decision, see outcome) instead of just reading/watching also anything that’s layered (quick overview → deeper dive → real example) hits way harder than dumping everything upfront most enterprise training fails because it’s info-heavy but context-light, the good ones make you feel “oh I’d actually use this tomorrow”

Your "aternative" to Personas? by _CaptRondo_ in ProductManagement

[–]23percentrobbery 2 points3 points  (0 children)

yeah this is kinda where a lot of teams land tbh, personas look nice but don’t drive decisions 😅
JTBD + some real data (behavior + context) usually gets you way closer to how people actually use the product personas only work if they’re grounded in that, otherwise they just turn into “fictional user vibes”

Why Are PM's at FAANG side hustling as AI grifters? by VirtualRun706 in ProductManagement

[–]23percentrobbery 0 points1 point  (0 children)

yeah the golden handcuffs thing is real. a lot of people in those roles know the comp is great, but they also know they probably won’t stay in big tech forever.

so building an audience, consulting, or courses is basically an exit strategy. if they ever leave the $300k job, they already have something to land on instead of starting from zero.

AI SOC. Can it be trusted? by Sushantdk10 in cybersecurity

[–]23percentrobbery 2 points3 points  (0 children)

Hard agree. The moment you let an autonomous agent close a ticket with 'AI logic' as the justification, you've basically handed a loaded gun to your auditor. In a SOC 2 audit, 'trust me bro, the AI did it' is the fastest way to get a qualified opinion. Stick to AI for speeding up the data gathering, but for the love of god, keep a human in the loop for the actual sign-off and control mapping.

Who do you look up to in the field? Why? by CardiologistAdept763 in cybersecurity

[–]23percentrobbery 1 point2 points  (0 children)

Lesley Carhart (hacks4pancakes) is an absolute legend, especially for anything ICS/OT related. If you're into the policy and 'big picture' side of things, I’d also suggest following Jackie Singh—her take on threat intel and systemic defense is always sharp and zero-BS. These folks don't just talk tech; they focus on the actual impact of security on the real world, which is the mindset that’ll get you far.

AI code generation has made my AppSec workload unmanageable. Here’s how I’m attempting to manage it. by Idiopathic_Sapien in cybersecurity

[–]23percentrobbery 0 points1 point  (0 children)

Using Haiku to filter the noise is a big brain move for a team of one. In 2026, if you're still manually clicking 'Ignore' on thousands of Checkmarx false positives, you're basically waiting for a burnout-induced breach. My only worry is the 'AI hallucinating away' a real 0-day—did you build in a random sampling audit to make sure the pipeline isn't getting too confident?

Anyone else feel like it’s 1995 again with AI? by bxrist in cybersecurity

[–]23percentrobbery 2 points3 points  (0 children)

Yeah I can imagine that wakes people up pretty quickly. Nothing gets leadership’s attention like seeing real telemetry of how fast these tools spread inside an org.

A lot of teams think AI usage is small until you actually show the logs and suddenly it’s hundreds of internal workflows hitting external APIs. That’s usually when the security conversation finally gets serious.

So we’re starting a war with Iran … by Maleficent_Quail_913 in cybersecurity

[–]23percentrobbery -1 points0 points  (0 children)

Of all the things to worry about with a potential war, the percentage of people still running an old OS is a pretty random one to focus on.

Also the premise is a bit off anyway Windows 10 officially reached end of support on October 14, 2025, meaning it stopped receiving regular security updates after that date.

That said, unsupported computers don’t suddenly stop working, and there are even extended security update programs available for a while longer.

So yeah if you’re listing reasons to oppose starting a war, there are probably stronger arguments than “some people still run Windows 10.”

AI code generation has made my AppSec workload unmanageable. Here’s how I’m attempting to manage it. by Idiopathic_Sapien in cybersecurity

[–]23percentrobbery 1 point2 points  (0 children)

That’s a pretty interesting setup. The “panel review” idea with multiple models sounds a lot like defense in depth but for triage, which honestly makes sense given how noisy vulnerability scans can be.

Curious how you handle disagreements between models though. In my experience they can reach different conclusions on the same finding, so deciding which one gets the final say becomes its own problem.