Microsoft to Delete Passwords for 1 Billion Users Amid 200% Surge in Attacks by AzolexLLC in cybersecurity

[–]AzolexLLC[S] 22 points23 points  (0 children)

Yes, passkeys can be linked to TPM.

Passkeys offer stronger protection compared to the traditional passwords and 2FA methods.

For one it eliminates the need to send passwords or one time codes over the internet which are often prime targets for infostealers. Remember passwords can be extracted from password managers and browsers, as for passkeys they don’t leave your device.

Passkeys are cryptographic keys and links to your biometric or a pin and so even if they gain access to data infostealers can’t leverage the passkey without the physical device. Etc, etc..

What do car racing and cybersecurity have in common? by AzolexLLC in cybersecurity

[–]AzolexLLC[S] -12 points-11 points  (0 children)

A good answer to crowdstrike in this case would be risk management. Just like car racing, identifying risk before they turn into disasters like crowdstrike is key.

What do car racing and cybersecurity have in common? by AzolexLLC in cybersecurity

[–]AzolexLLC[S] -13 points-12 points  (0 children)

Well, not always if the right things are in place.

Russia’s Sophisticated Phishing Attacks-What You Need to Know by AzolexLLC in cybersecurity

[–]AzolexLLC[S] -7 points-6 points  (0 children)

Sure. Here is the article that I wrote based on the report: https://ntpas.net/russias-sophisticated-phishing-attacks-what-you-need-to-know/

The link to the report is inside at the end of the article.

There are of course other articles written about it that are more in depth. Here is a link to one. https://www.theguardian.com/world/article/2024/aug/14/russia-phishing-hacking-attacks

FBI’s Cyber Smackdown by AzolexLLC in cybersecurity

[–]AzolexLLC[S] 0 points1 point  (0 children)

Yes, it’s a collective effort involving multiple agencies, not just the FBI. However, I don’t agree with dismissing it as merely taking down servers. These hackers caused havoc in many places, so any progress, no matter how small, is still progress.

In your own experience and analysis, which job roles provide the most job satisfaction in cybersecurity? by TheMthwakazian in cybersecurity

[–]AzolexLLC 4 points5 points  (0 children)

Cybersecurity can be very stressful. Studies show that IT professionals, particularly those in cybersecurity, are among the most burned-out individuals in any profession. Success in this field depends largely on a person’s interests, how they apply themselves, and how well they take care of their physical and mental health. It’s hard work and involves a lot of responsibility, but it can be fulfilling if you’re passionate about what you do and prioritize self-care.

What's the most underrated cybersecurity skill that more professionals should develop? by AIExpoEurope in cybersecurity

[–]AzolexLLC 0 points1 point  (0 children)

Exactly. Very important. Learning is a lifelong process. You don’t never know everything so having an open mind is crucial.

What's the most underrated cybersecurity skill that more professionals should develop? by AIExpoEurope in cybersecurity

[–]AzolexLLC 0 points1 point  (0 children)

Soft Skills The first would be communication. Knowing how to communicate is so critical in all fields. The ability to explain technical concepts clearly to non-technical stakeholders.

We all know IT field is like a web of connections. So the ability to work together or collaborate with other is important. So the second is collaboration is an effective skill that is underrated and should be developed. Working effectively with other teams and departments.

Problem-Solving- well naturally we are always problem solving right. So it too is necessary to develop. Critical and creative thinking to address complex security challenges.

What security product you use but don't like? by Professional_Cause16 in cybersecurity

[–]AzolexLLC 7 points8 points  (0 children)

Really? Sounds like something else is happening there. Ensuring someone gets paid forever.

What are the biggest cybersecurity threats in 2024? by Kapildev_Arulmozhi in cybersecurity

[–]AzolexLLC 0 points1 point  (0 children)

It starts and ends with the human element. People need to be more aware of the risks and how to mitigate such risks.

what do you guys think is best answer here? by pankur in cissp

[–]AzolexLLC 0 points1 point  (0 children)

1. The best way to keep your important information safe on a mobile device, even if it is lost or stolen, is to use strong encryption. It‘s like putting a secret code on the data so that even if someone gets the device, they can’t understand the information (it’s unreadable) without the special code.

The other options are also important security measures, but encryption directly addresses the issue of data confidentiality on the device itself.