Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Google makes passkeys the default login method
2 min Security

Google makes passkeys the default login method

Floris Hulshoff PolOctober 11, 2023 3:27 pmOctober 11, 2023 3:27 pm
Google makes passkeys the default login method

Google made the use of passkeys the default login method for all users. This should provide users with the strongest login security.

Effective immediately, Google is making the use of passkeys the new login method for its services. From now on, when users log in to Google, they will immediately be prompted to create and use passkeys. With this, according to the tech giant, the “end of the password” is arriving.

In addition, users will also see a “Skip passkey when possible” option checked in their Google Account settings. This option allows users to indicate whether they actually want to use passkeys or stick with passwords for now.

According to the tech giant, these passkeys will make logging into Google services easier from now on. This way, they will no longer have to remember all their passwords, with all capital letters, numbers and other characters. The tech giant has recently been testing the technology in various tools.

On-device encryption

Passkeys are physical FIDO-encrypted login credentials that are stored on a device. Users can then access the relevant devices via fingerprint, facial scan or PIN. This eliminates the need for a username-password combination and removes the vulnerability of this data through phishing or other attacks.

Also read: Google presents algorithm that protects passkeys from quantum attacks

Tags:

Google / Login / passkey

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Google: AI likely aided attackers to develop a zero-day

Anthropic said to commit to $200B in AI capacity on Google Cloud

Google, Microsoft, and xAI allow the government to test AI models in advance

Google plans to invest up to $40 billion in AI rival Anthropic

Editor picks

Who will dominate enterprise AI? ServiceNow claims it will, but rivals are closing in

Is ServiceNow becoming a security company?

Towards an agentic IT infrastructure: what does that mean?

The deepest IT management layers are also the most dangerous. The inf...

ServiceNow moves beyond control tower to govern and kill enterprise AI

You need to monitor and control your AI

“MCP is just an API,” and that is precisely the problem with Gemini Enterprise

Google presents the Agentic Data Cloud as the connective tissue of th...

Techzine.tv

Inside Cisco's AI-powered customer experience strategy

Inside Cisco's AI-powered customer experience strategy

Cisco reimagines network ops with agentic AI

Cisco reimagines network ops with agentic AI

How Ansible becomes the execution layer for agentic AI

How Ansible becomes the execution layer for agentic AI

AI creates brand new attack surfaces in cloud security

AI creates brand new attack surfaces in cloud security

Read more on Security

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result
Top story

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result

Attribute-based encryption at the data layer

Sander Almekinders April 15, 2026
Security by Design prevents higher bills
Top story

Security by Design prevents higher bills

Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...

Berry Zwets April 16, 2026
Instructure pays ShinyHunters to delete the data it stole

Instructure pays ShinyHunters to delete the data it stole

Update (Erik van Klinken, May 12, 12:10 PM): Instructure, the maker of the Canvas learning platform, has reac...

Mels Dees 11 hours ago
Cisco open-sources Foundry Security Spec for CISO-ready agents

Cisco open-sources Foundry Security Spec for CISO-ready agents

LLMs are proving increasingly useful for security research. Cisco aims to standardize and streamline the proc...

Erik van Klinken 8 hours ago

Expert Talks

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Agentic AI is reshaping the network – and it’s time to upgrade

Wireless connectivity is becoming a critical infrastructure for the A...

Tech calendar

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

GITEX AI EUROPE 2026

June 30, 2026 Messe Berlin Exhibition Center, South Entrance

GOTO Copenhagen 2026

September 28, 2026 TAP1, Raffinaderivej 10, 2300 København S, Denmark

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement