Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google makes passkeys the default login method
2 min Security

Google makes passkeys the default login method

Floris Hulshoff PolOctober 11, 2023 3:27 pmOctober 11, 2023 3:27 pm
Google makes passkeys the default login method

Google made the use of passkeys the default login method for all users. This should provide users with the strongest login security.

Effective immediately, Google is making the use of passkeys the new login method for its services. From now on, when users log in to Google, they will immediately be prompted to create and use passkeys. With this, according to the tech giant, the “end of the password” is arriving.

In addition, users will also see a “Skip passkey when possible” option checked in their Google Account settings. This option allows users to indicate whether they actually want to use passkeys or stick with passwords for now.

According to the tech giant, these passkeys will make logging into Google services easier from now on. This way, they will no longer have to remember all their passwords, with all capital letters, numbers and other characters. The tech giant has recently been testing the technology in various tools.

On-device encryption

Passkeys are physical FIDO-encrypted login credentials that are stored on a device. Users can then access the relevant devices via fingerprint, facial scan or PIN. This eliminates the need for a username-password combination and removes the vulnerability of this data through phishing or other attacks.

Also read: Google presents algorithm that protects passkeys from quantum attacks

Tags:

Google / Login / passkey

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Anthropic said to commit to $200B in AI capacity on Google Cloud

Google, Microsoft, and xAI allow the government to test AI models in advance

Google plans to invest up to $40 billion in AI rival Anthropic

Google Gemini Enterprise to become the AI platform for everyone

Editor picks

ServiceNow expands autonomous workforce to nearly all business roles

At Knowledge 2026, ServiceNow is introducing a new series of AI speci...

Who will dominate enterprise AI? ServiceNow claims it will, but rivals are closing in

Is ServiceNow becoming a security company?

Object First brings absolute immutability to Veeam backups

Object First, founded by the creators of Veeam, provides immutable ba...

Fire at Dutch data center has many unintended consequences

Many fail business continuity stress test

Techzine.tv

How Falco catches threats that static analysis misses

How Falco catches threats that static analysis misses

How to migrate from Redis to Valkey with zero downtime

How to migrate from Redis to Valkey with zero downtime

Cisco reimagines network ops with agentic AI

Cisco reimagines network ops with agentic AI

IFS builds an industrial AI ecosystem through partnerships

IFS builds an industrial AI ecosystem through partnerships

Read more on Security

Schools negotiate with hackers following Canvas data breach

Schools negotiate with hackers following Canvas data breach

Educational institutions in the United States are attempting to negotiate directly with the hacker group Shin...

Mels Dees 10 hours ago
Security by Design prevents higher bills
Top story

Security by Design prevents higher bills

Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...

Berry Zwets April 16, 2026
Checkmarx Jenkins plugin compromised in new supply chain attack

Checkmarx Jenkins plugin compromised in new supply chain attack

A tampered version of the Checkmarx Jenkins AST plugin has appeared in the Jenkins Marketplace. The attack ha...

Berry Zwets 7 hours ago
NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result
Top story

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result

Attribute-based encryption at the data layer

Sander Almekinders April 15, 2026

Expert Talks

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Agentic AI is reshaping the network – and it’s time to upgrade

Wireless connectivity is becoming a critical infrastructure for the A...

Tech calendar

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

GITEX AI EUROPE 2026

June 30, 2026 Messe Berlin Exhibition Center, South Entrance

GOTO Copenhagen 2026

September 28, 2026 TAP1, Raffinaderivej 10, 2300 København S, Denmark

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement