Yubico Webinar: Google Talks Security Key, Apps

Google is doubling down on authentication with a strong commitment to FIDO’s Universal Second Factor (U2F) protocol and Yubico’s Security Key as part of an expanding emphasis on security.

The cloud computing giant joined Yubico on a live Webinar to continue a conversation entitled “Google for Work, FIDO U2F, and YubiKeys.” A recording of the webinar is now available for playback online.

Julien Blanchez, marketing lead for Google for Work, outlined where the Security Key fits into Google’s security strategy. He cited three security trends — increased risk, more complex security, and new work environments — as proof that the cloud is the right response for Google to address all three.

“We are not facing teenagers in basements anymore, we are facing armies targeting large organizations and individuals,” he said.

He cited Google’s innovation, size, and agility as top weapons in its arsenal. “Google can see things in a comprehensive way,” he said. Blanchez  tagged authentication as the most important security issue today, saying three-quarters of 2014’s hacks were linked to the theft of login credentials.

Yubico and Google co-invented the U2F protocol. Yubico invented the Yubikey, including the Security Key, and has focused on U2F support. These U2F-based keys can now protect all Google services with two-step verification. Currently Google has a special offer for a 50% discount on Security Keys for Google for Work customers in the US, Canada, and EU. (It should be noted that FIDO U2F Security Key, YubiKey NEO, and YubiKey Edge all support U2F but only Security Key is part of the offer.)

In addition, Google is actively adding Security Key management controls to its cloud services, including Google for Work, Google Apps Unlimited and Google for Education. “In the coming months we will become stronger and stronger advocates for these Security Keys,” Blanchez said.

Yubico continued the discussion with an in-depth look at the YubiKey, its place on the authentication landscape, its range of authentication options, support for U2F, and how its unique one-touch user interface is solving one of cryptography’s major complexity issues.

A live demo shows how to register a YubiKey in the Chrome browser with three brief steps. The benefits are phishing protection, privacy, affordability and the ability to use one key to authenticate to many services.

A glimpse is given of the differences and complementary relationship of the YubiKey and smartphones-as-authenticators. The wrap-up features answers to a range of audience questions from browser-based U2F support to lost YubiKeys.

Yubico’s Kevin Casey, senior solutions engineer, and Sue Heim, information development, host the webinar.

Talk to our teamTalk to our team

Share this article:


  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU
  • Securing critical infrastructure from modern cyber threats with phishing-resistant authenticationAcross the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the energy and natural resources powering our hospitals and providing clean drinking water, telco […]Read moreCISAcritical infrastructurezero trust