For years, passwords have been the weakest link in cybersecurity.
Not because they’re inherently flawed, but because humans are.
We reuse them.
We make them predictable.
We fall for phishing.
And attackers have become exceptionally good at exploiting all three.
Now, GCHQ, through the UK’s National Cyber Security Centre (NCSC) is signalling something significant:
It’s time to move beyond passwords.
The threat landscape has changed dramatically.
Credential-based attacks remain one of the most common initial access methods. Phishing kits, infostealer malware, and credential stuffing tools are now widely available and increasingly automated.
Add AI into the mix, and the speed and scale of these attacks increases again.
Attackers don’t need to “hack” systems in the traditional sense anymore.
They just log in.
Passkeys are being positioned as the successor to passwords and for good reason.
Instead of relying on something you know (a password), passkeys rely on something you have (your device) and something you are (biometrics like fingerprint or face recognition).
Behind the scenes, this uses public key cryptography:
That means:
This isn’t just a consumer convenience shift - it’s a security control evolution.
From a CISO perspective, passkeys directly address several long-standing risks:
But the bigger story is this:
Identity is becoming the primary security perimeter.
And anything that strengthens authentication without relying on user behaviour is a major step forward.
Before we declare passwords dead, there are realities to consider:
And importantly:
Attackers will adapt.
If credentials disappear, focus shifts elsewhere - session hijacking, device compromise, social engineering at a different layer.
This is not a “rip and replace” moment, but it is a direction of travel.
Practical steps:
GCHQ’s message isn’t just about passkeys.
It’s about recognising that the traditional model of shared secrets is fundamentally broken at scale.
And in a world where attackers are faster, more automated, and increasingly AI-enabled…
Security controls that rely on users “doing the right thing” are no longer enough.
Browse more content in this category and keep building your knowledge with helpful insights, tutorials, and real-world tips.