Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Gaming
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Passkeys Are Gaining Ground, But Yubico Urges Security Leaders To Step Up
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > IT Security > Passkeys Are Gaining Ground, But Yubico Urges Security Leaders To Step Up
IT Security

Passkeys Are Gaining Ground, But Yubico Urges Security Leaders To Step Up

Yubico says that passwords are being phased out in favor of passkeys, which provide both stronger security and a smoother login experience. However, security leaders must raise the bar now to prevent millions of users from becoming even more vulnerable. Enterprises offered strong security policies save time and money

Editorial Desk
Last updated: August 19, 2025 1:10 am
Editorial Desk
Share
SHARE

According to Yubico, passwords are on their way out. Replacing them is a new form of login called passkeys, which promises stronger security, a smoother user experience, and significantly less frustration for both users and security teams.

Contents
Synced vs. device-bound passkeys: the critical differenceSynced passkeysDevice-bound passkeysThe Recovery GapCIOs and CISOs: demand configurability and controlAdvice For Product Managers: Build Choice InBenefits

All passkeys offer the rare combination of improved usability and stronger security, especially when compared to passwords alone. But unless we act now, millions could be left more vulnerable than ever.

“The global momentum behind passkeys represents one of the most exciting shifts in authentication history,” said Christopher Harrell, Chief Technology Officer at Yubico.

“The technical specifications that enable this shift are FIDO2 and WebAuthn, and their implementations are now widely known by the consumer-friendly name ‘passkeys’.

“As the creator of the first passkeys, passkeys in security keys, Yubico is proud and humbled to have helped initiate and continue to drive this transformation. Yet, the work isn’t done,”

“Not all passkeys are equal, not all users have the same needs, and leaving insecure fallback methods in place can provide a false sense of security,” said Harrell

This is how security leaders, builders, product managers, and individuals can make sure passkeys work for everyone.

Synced vs. device-bound passkeys: the critical difference

Synced passkeys

For many, passkeys are synonymous with synced passkeys, where the private key is stored in the cloud and copied between devices.

Synced passkeys offer a practical, user-friendly solution for some use cases, but they depend heavily on the security and availability of the sync mechanism, recovery systems and processes, and the cloud accounts they’re tied to.

For people and organisations that face higher risks, have greater sensitivity or accessibility needs, or individuals who just want the best protection for their finances or other critical accounts, synced passkeys aren’t enough.

Device-bound passkeys

Device-bound passkeys never leave the secure hardware where they are created and provide the strongest protection against phishing, account takeover, and recovery abuse. There are two primary implementations:

  • Smartphone/laptop-based: These can be convenient, but aren’t always an available option and can provide inconsistent experiences. For example, most smartphone-based passkey solutions have usability challenges because of confusing QR codes, buggy or missing Bluetooth, and unreliable relay access.

  • Hardware security keys(like YubiKeys): The gold standard and original passkey, offering the highest security assurance by providing portable, cross-platform, and consistent passkey experiences. They serve as a root of trust for every use case, across borders and in high-risk situations.

Bottom line: Synced passkeys should be the baseline. Device-bound passkeys must be an option, and in some cases, the requirement.

What are Passkeys

The Recovery Gap

Even with device-bound passkeys enabled, accounts remain vulnerable if weaker recovery methods are still allowed:

  • Text messages
  • Code-generation apps
  • Push notification approvals
  • Number matching prompts

“Attackers understand this and actively downgrade to insecure, phishable mechanisms to avoid the phishing-resistant security passkeys provide,” said Christopher Harrell.

CIOs and CISOs: demand configurability and control

According to Christopher Harrell, enterprise-grade protection means control over the authentication policies. He said: “Passkeys in YubiKeys and Windows Hello for Business are better together, offering non-exportable credentials that cannot be silently synced, phished, or copied.

“These passkeys can provide clear visibility into how and where they are stored, which enables more consistent support, audit and incident response processes.” Harrell, said.

Key requirements to demand from identity providers and partners:

  • Enforce only device-bound passkeys in any identity providers
  • Require them by policy, even for services outside the SSO
  • Disable synced passkeys for enterprise use
  • Use passkeys in security keys as a root of trust for self-service recovery, transition, and step-up
  • Remove all non-FIDO fallback methods
  • Enforce only device-bound passkeys in the identity providers
  • Require them by policy, even for services outside the SSO
  • Disable synced passkeys for enterprise use
  • Use passkeys in security keys as a root of trust for self-service recovery, transition, and step-up
  • Remove all non-FIDO fallback methods.

“To make this work, the services used have to allow it. Organisations should demand configurability from identity providers, workforce tools, and partners,” said Harrell

“Think about protecting your organisation with authentication designed for the realities of your threat landscape. Organisations that do this see fewer recovery events, lower costs, and greater resilience,” he said.

Advice For Product Managers: Build Choice In

“Don’t exclude security keys; it often takes more effort to block them than to support them. And if you’re stuck, technically or from a usability perspective, Yubico is here to help,”

“We’ve partnered with governments, Fortune 500s, and identity platforms to solve many challenges at scale across the globe,” said Harrell.

“As a product leader or engineer rolling out passkey support in your application, you are shaping the future of digital identity and safety.

If you’re building a banking app, social network, government portal, an identity provider, or anything else, you are also deciding who gets access to higher levels of protection,” he said.

Benefits

  • Enterprises that are offered strong security policies can save time and money, and harden recovery flows against social engineering.

  • High-value accounts can use the strongest phishing resistance to protect all assets.

  • At-risk individuals and organisations, ranging from journalists and whistleblowers to those securing political processes or members of marginalised communities, depend on YubiKeys as a lifeline. 

  • People with accessibility needs often prefer or need portable hardware security keys because of their predictable, tactile, and cross-platform experience that reduces screen reader challenges and eliminates complex or unfamiliar gestures.

  • The stakes are global and personal: Build a passkey future that works for everyone.

“Authentication should be adaptable and flexible, not rigid and monolithic. Higher-assurance security is not just for the enterprise; it’s a lifeline for millions,” said Harrell.

Here are just a few people and groups who need the strongest passkey protections the most:

  • Government officials, diplomats, and military leaders
  • Legal workers, judges, and law enforcement
  • High-profile executives, influencers, and celebrities
  • Developers and maintainers of software and systems
  • Security practitioners and researchers
  • Survivors of domestic violence or trafficking
  • Activists, journalists, and other vulnerable populations or organisations
  • Those without reliable access to a personal phone or computer
  • People with accessibility needs
  • Every day individuals, who want the best protection.

A person or organisation can become “at-risk” overnight through a political event, security incident, or public exposure. Having the ability to quickly improve security posture can dramatically increase safety and peace of mind.

Security leaders and product teams are urged to make security keys a core part of their passkey strategy, allow users to disable insecure fallbacks, and give everyone the ability to choose their preferred level of protection.

ByEditorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure New Dragos Report Estimates Global OT Cyber Risk Exposure Exceeding $300 Billion
Next Article Mike Davis CEO - Felix Group Acquires Nexvia with construction and capital raise of $16m - Felix Group Acquires Nexvia To Drive Construction Tech Innovation And Growth
Leave a Comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Passkeys are winning, but security leaders must raise the bar says Yubico - Christopher Harrell

Tech Articles

Chatbots Condemning Children To Antisocial Behaviour?

Are Chatbots Condemning Children To Antisocial Behaviour?

Are Chatbots Condemning Children To Antisocial Behaviour? Not by default…

March 2, 2026
Why is APAC losing the war on digital fraud

Why APAC is Losing Ground In The Fight Against Digital Fraud

Why APAC is losing the war on digital fraud is…

May 6, 2026

How the World’s Data Centres Are Quietly Burning the Planet

Data centres are burning the planet, with a growing environmental…

March 11, 2026

Recent News

WordPress Security Pkugins stop attacks - Tech News
IT Security

WordPress Security Plugins Won’t Stop All Sophisticated Attacks

11 Min Read
Organisations overlook AI risk as governance fails to keep up - Rachel Jin
IT Security

TrendAI™ Finds Organisations Rushing AI Deployment Despite Security Risks

6 Min Read
Mitigating Threats To Cloud-Based GPUs
IT Security

Mitigating Threats To Cloud-Based GPUs

7 Min Read
Cisco RV router patch
IT Security

Cisco urges customers to patch vulnerabilities discovered in its RV series routers.

3 Min Read
Tech News

Tech Business News

In 2026, technology news is shaping business outcomes faster than ever—driven by AI adoption, rising cyber risk, cloud modernisation, data regulation, and constant platform change.


Tech News keeps Australian organisations and industry professionals informed with timely reporting and practical coverage across AI, cybersecurity, cloud, enterprise IT, startups, science, people and business, plus major world and local news impacting the tech sector.


Tech Business News publishes news and analysis designed to be clear, relevant, and easy to act on. It supports the industry with technology news reports, whitepaper publishing services, and a range of media, advertising and publishing options 

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

May, 12, 2026

Contact

Tech Business News
Melbourne, Australia
Werribee 3030
Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.

Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2026

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?