searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Related topics

  • Google offers Advanced Protection for high-risk users of its services

Featured news

  • Attackers disrupting COVID-19 efforts and critical supply chains
  • C-level executives driving the adoption of MACH across their organizations
  • Users largely unaware of the privacy implications of location tracking
  • CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses
  • Most businesses see state-sponsored cyberattacks as a major threat
Zeljka Zorz
Zeljka Zorz, Managing Editor, Help Net Security
July 26, 2018
Share

After extensive testing, Google introduces the Titan Security Key

Google recently shared that since it made employees use physical security keys instead of passwords and one-time codes, none of them – and there are over 85,000 – have been successfully phished.

On Wednesday, the company announced that they have created their own line of security keys called Titan Security Key and that they’ve been testing it in-house for over a year.

Google security key

The Titan Security Key

Security keys are physical keys that are used to provide user authentication over Bluetooth and USB. They won’t work on phishing sites made to look like the real deal.

Titan Security Key adheres to the FIDO (Fast IDentity Online) specification and includes firmware developed by Google to verify its integrity.

“We’ve long advocated the use of security keys as the strongest, most phishing-resistant authentication factor for high-value users, especially cloud admins, to protect against the potentially damaging consequences of credential theft,” noted Jennifer Lin, Product Management Director, Google Cloud.

Titan Security Keys are currently available for Google Cloud customers and will soon be available for anyone to purchase on the Google Store.

Users will be able to use the key to authenticate to non-Google services, too, although the integrity verification firmware might not work on them.

Increased security

Because passwords and second factor authentication codes (codes sent via SMS or received via apps like Google Authenticator) can be intercepted or phished, Google has been promoting the use of physical security keys for a more secure authentication process for a while now.

In October last year, Google launched the Advanced Protection setting for Google accounts. Aimed at high-risk users such as journalists, activists and politicians, the setting includes the use of a security key.

They also advised users to create two of them, so they’ll have a backup key in case they lose they main one.

More about
  • account protection
  • authentication
  • Google
  • hardware
Share this
architecture

Why enterprises need rugged devices with integrated endpoint management systems

  • Five factors driving investment in IDV
  • 2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?
Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations

What's new

hand

Attackers disrupting COVID-19 efforts and critical supply chains

identity

Five factors driving investment in IDV

architecture

Why enterprises need rugged devices with integrated endpoint management systems

businessman

C-level executives driving the adoption of MACH across their organizations

Don't miss

architecture

Why enterprises need rugged devices with integrated endpoint management systems

identity

Five factors driving investment in IDV

tracking

CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

template

Third-party risk management programs still largely a checkbox exercise

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps
  • How do I select a DRM solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise