Passkeys: The Future of Authentication?

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

By loading the podcast, you accept Libsyn's privacy policy.
Read more

Load podcast

We’re thrilled to have Jan Bakker, a seasoned Cloud Consultant with over 10 years of IT experience, joining us from the Netherlands. In this episode, Andy and Jan explore the revolutionary concept of passkeys, a technology that aims to replace traditional passwords and enhance security by providing phishing resistance. The conversation delves into the significance of passkeys and their value in improving user experience and security measures. The guys even discuss what is currently known publicly about passkeys in M365. 

Key takeaways 

  • Passkeys offer a more secure and user-friendly alternative to traditional passwords by eliminating the need for storing secrets on the server side. 

  • Public key cryptography forms the foundation of passkeys, ensuring strong authentication without the risk of password breaches. 

  • Passkeys provide phishing resistance and streamline the authentication process for end users, reducing the reliance on complex passwords and additional MFA steps. 

  • While passkeys offer significant security benefits, they are not a standalone solution and should be complemented with other security measures such as phishing prevention and identity protection strategies. 

Timestamps: 

(00:13) – Unveiling the Power of Pass Keys in Cybersecurity with Jan Bucker 

(03:47) – The Rise of MFA Bypass Kits and Adversary in the Middle Attacks 

(14:55) – Unlocking the Future of Passwordless Authentication with Passkeys 

(24:55) – Addressing Persistent Access in Malicious Apps and OAuth: A Call for Improved Security Practices 

(29:59) – Unpacking the Importance of Phishing Resistance and Token Security in Cybersecurity 

(33:01) – Enhancing Security with Passkeys and Onboarding Procedures in Public Services 

Episode resources: 

Passkeys Directory 

Jan Bakker’s website 

The Security Swarm Podcast – EP24: The Danger of Malicious OAuth Apps in M365 

Start your free trial of M365 Total Protection

Are Tech “Innovations” Accelerating Security Threats?

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

By loading the podcast, you accept Libsyn's privacy policy.
Read more

Load podcast

In today’s fast-paced world, digital transformation has become a necessity for businesses to stay ahead of the game. With the increasing reliance on digital tools, however, there has been a seemingly corresponding rise in security incidents. Coincidence?  

The evolving landscape of IT and technology has brought to the forefront the question of whether the latest tech “innovations” are actually accelerating security threats.  

In this episode, Andy and Paul delve deeper into this issue, exploring how businesses can balance their need for technological advancements with maintaining robust security measures to protect against cyber threats. 

Timestamps: 

(2:54) – Commentary on the Rate of Change in Technology 

(13:21) – How has Innovation in Microsoft Cloud Services Contributed? 

(23:33) – What is the Cost of Innovation on Security Postures? 

Episode Resources:

Article from Andy Robbins

Listen to episode 34

Listen to episode 22

365 Total Protection Free Trial

Tips and Tricks for Getting Started in Cybersecurity

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

By loading the podcast, you accept Libsyn's privacy policy.
Read more

Load podcast

Ever wondered what it takes to break into the exciting world of cybersecurity? Join us in our latest podcast episode as we sit down with Grant Collins, an infrastructure security engineer and cybersecurity career coach. From choosing the right degree to navigating the hiring process, acquiring essential skills, and building a robust professional network, Grant and Andy share their personal experiences and insights.

Throughout the episode, they debate on academic vs practical learning by comparing the merits of pursuing a cybersecurity/IT degree versus gaining real-world experience and self-directed training. They discuss the pros and cons of each approach, offering valuable insights to help you chart your own path in the cybersecurity landscape.

Timestamps:

(5:08) – Why Should You Consider a Career in Cybersecurity?

(11:30) – What Educational Pathways Can I Take to Learn Cybersecurity?

(26:15) – How can I Cultivate Practical Skills in Cybersecurity?

(34:13) – What are Some Tips and Tricks for Landing a Job in Cybersecurity?

Episode Resources:

Check out Grant’s YouTube Channel

cybersecurity (reddit.com)

TryHackMe | Cyber Security Training

Hack The Box: Hacking Training For The Best | Individuals & Companies

Lockbit’s Return, ScreenConnect Vulnerability & a US Healthcare Cyber Attack

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

By loading the podcast, you accept Libsyn's privacy policy.
Read more

Load podcast

Security headlines have been buzzing with major security events this month. In this podcast episode, Andy and Eric Siron discuss Hornetsecurity’s Monthly Threat Report, analyzing recent security incidents and sharing expert insights.

Tune in for more information on Lockbit’s takedown and its reemergence days later, the CVSS 10 vulnerability in ConnectWise Screenconnect, and the Change Healthcare cyber-attack that has practically paralyzed prescription refills and is likely contributing to numerous deaths in the US.

Timestamps:

3:32 – Hornetsecurity Industry Data Review for Feb 1st to March 1st

14:10 – The “takedown” and re-emergence of LockBit

18:33 – CVSS 10 Vulnerability in ConnectWise ScreenConnect

31:11 – Optum/Change Healthcare Ransomware Attack

Episode Resources:

Read the full report 

Lockbit Takedown Notice

ScreenConnect Vulnerability – CVE-2024-1709

Ransomware Attack on Optum / Change Healthcare

365 Total Protection

Insider Threats in Microsoft 365

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

By loading the podcast, you accept Libsyn's privacy policy.
Read more

Load podcast

Join host Andy and special guest Philip Galea, R&D Manager at Hornetsecurity, as they explore insider threats within Microsoft 365. In this episode, the focus is on SharePoint Online and OneDrive for Business, shedding light on the nuances of insider threats and offering valuable insights on safeguarding against them. 

Tune in for expert analysis and practical tips on fortifying your defenses and protecting your organization’s sensitive data in the evolving landscape of cloud-hosted infrastructures. 

Episode Resources:

Effortlessly manage Microsoft 365 permissions 

Microsoft vs Midnight Blizzard

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

By loading the podcast, you accept Libsyn's privacy policy.
Read more

Load podcast

During last week’s episode, we briefly spoke about major security incidents that took place between January and February 2024, including the Midnight Blizzard attack. Today, we’re delving deeper into the specifics of this attack. From exploiting OAuth mechanics to navigating Microsoft’s corporate environment, the attackers demonstrated a level of sophistication that evaded conventional detection controls.  

Tune in to hear Andy and Paul examine its intricate attack chain and discuss their insights on what Microsoft should do in response.  

Timestamps: 

(2:00) – What does the attack chain for this breach look like? 

(7:11) – Timeline of the Attack 

(8:53) – Thoughts on Microsoft’s Response 

(18:55) – A Definition of an OAuth App and a Service Principal 

(27:36) – What do Admins need to do about this? 

(33:20) – Does the speed of change and the scale of Cloud Services negatively impact security? 

Episode Resources: 

Andy and Paul Discuss Malicious OAuth Apps

YouTube Video from Andy Robbins

BingBang