UK Government Sets Timeline to Replace Passwords With Passkeys

NCSC Chief Technical Officer, Ollie Whitehouse, urged all UK organizations to develop strategies to move beyond traditional password and multi-factor authentication solutions, stating they protect against common cyber threats such as phishing and credential stuffing. “We strongly advise all organizations to implement passkeys wherever possible to enhance security, provide users with faster, frictionless logins and to save significant costs on SMS authentication,” he said. AI and Digital Government Minister Feryal Clark emphasized the importance of this transition: “This shift will not only save users valuable time when interacting with the government online, but it will reduce fraud and phishing risks that damage our economic growth”. Unlike traditional passwords, which can be guessed, stolen, or phished, passkeys leverage public-key cryptography to create a more secure authentication system. GOV.UK services, which cover critical areas including benefit claims, childcare support, and tax credits, will transition to this more secure authentication method, positioning the UK as a global leader in passwordless technology adoption. Additionally, the UK government has joined the FIDO Alliance, an open industry association dedicated to shaping password-free authentication standards. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. When implementing passkeys, a private key is stored on the user’s device and used to create cryptographic authentication signatures. Announced during the CYBERUK 2025 conference in Manchester, this initiative aims to replace the current SMS-based two-factor verification system across government accounts by the end of 2025. Authentication is enabled through biometric sensors such as fingerprint or facial recognition, eliminating the need for users to remember complex passwords. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. The government’s membership in the FIDO Alliance will enable it to play an active role in the evolution of passkey standards, ensuring the UK maintains its position at the forefront of cybersecurity innovation.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 07 May 2025 16:19:58 +0000


Cyber News related to UK Government Sets Timeline to Replace Passwords With Passkeys

New Developer Tools Are Necessary to Boost Passkey Adoption - The password-less technology known as passkeys are esoteric, far from widely adopted, and confusing for consumers. Based on the WebAuthn standard created by the World Wide Web Consortium and the FIDO Alliance - and jointly supported by Apple, Google, ...
1 year ago Darkreading.com
Getting Started With Passkeys, One Service at a Time - In addition to the major three technology firms supporting passkeys - Apple, Google and Microsoft - third-party password providers, such as 1Password and Bitwarden, implemented their own support for managing the credentials. Overall, more than 7 ...
1 year ago Darkreading.com
Passkeys And Cybersecurity Awareness: A New Era Of Business Security - Again, in line with Cybersecurity Awareness Week, consider using password managers—a great tool to store and manage passkeys that provides a seamless way to integrate advanced authentication methods while keeping credentials safe and easily ...
7 months ago Informationsecuritybuzz.com
How To Start Using Passkeys? - To embark on this journey of enhanced protection, the initial step is to comprehend the essence of passkeys and their pivotal role in safeguarding your digital assets. The process kicks off with selecting a robust and unique passkey that serves as ...
1 year ago Hackersonlineclub.com
Stytch offers toolkit for developers to build, implement, and customize passkey-based authentication - Stytch announced its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications. Stytch's new solution offers a flexible, API-first approach to passkeys that abstracts the ...
1 year ago Helpnetsecurity.com
How Passkeys are Revolutionizing Authentication - Today, authentication technology has become a vital part of online security. The need to secure user data against malicious actors has led to a rapidly evolving authentication landscape. Passkeys are a form of authentication that is revolutionizing ...
2 years ago Csoonline.com
UK Government Sets Timeline to Replace Passwords With Passkeys - NCSC Chief Technical Officer, Ollie Whitehouse, urged all UK organizations to develop strategies to move beyond traditional password and multi-factor authentication solutions, stating they protect against common cyber threats such as phishing and ...
2 weeks ago Cybersecuritynews.com
The most popular passwords of 2023 are easy to guess and crack - Each year, analysts at various Internet security companies release lists of the most used passwords. ADVERTISEMENT. The passwords that are on these lists may act as a warning for any Internet and electronic device user. Some common passwords have ...
1 year ago Ghacks.net
Lawmakers: Ban TikTok to Stop Election Misinformation! Same Lawmakers: Restrict How Government Addresses Election Misinformation! - In a case being heard Monday at the Supreme Court, 45 Washington lawmakers have argued that government communications with social media sites about possible election interference misinformation are illegal. Just this week the vast majority of those ...
1 year ago Eff.org
The 7 technology trends that could replace passwords - In passwords, this provides a secure way to let users prove that they know their own password, without any need to transmit their actual credentials – it is a cryptographic method that proves you know your password without needing to actually ...
1 month ago Bleepingcomputer.com
6 Best Password Managers: Features, Pricing, and Tips - WIRED readers have also asked about Apple's macOS password manager, which syncs through iCloud and has some nice integrations with Apple's Safari web browser. There's nothing wrong with Apple's system. I have used Keychain Access on Macs in the past, ...
1 year ago Wired.com
Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors - The 2023 data from Enzoic for Active Directory Lite data from 2023 offers a revealing glimpse into the current state of cybersecurity, highlighting a significant increase in risk factors that lead to data breaches. The free password auditor has been ...
1 year ago Securityboulevard.com
Bitwarden adds passkey support to log into web password vaults - The open-source Bitwarden password manager has announced that all users can now log into their web vaults using a passkey instead of the standard username and password pairs. Passkeys are the more secure alternative to the passwords that most people ...
1 year ago Bleepingcomputer.com
Google is going to kill your passwords - For many years, passwords have been one of the weakest links in IT security - yet most online services are still heavily reliant on them. Every week we hear examples of passwords being leaked or brute force attacks breaking into accounts with weak ...
1 year ago Pandasecurity.com
How to use the Apple Passwords app - Help Net Security - The app’s Security section informs you if you have chosed easily guessable or reused passwords, or if that particular password has been compromised (i.e., appears in public data leaks). To edit passwords, select the “All” section and then ...
7 months ago Helpnetsecurity.com
X adds passkeys support for iOS users in the United States - X, formerly Twitter, announced today that iOS users in the United States can now log into their accounts using passkeys. The passkeys will be linked to the iOS device they're generated on and will significantly reduce the risk of breaches by ...
1 year ago Bleepingcomputer.com
Mapping The Cyber Kill Chain Using Correlated Security Logs And Timeline Tools - Mapping the cyber kill chain using correlated security logs and timeline tools enables organizations to move from reactive to proactive defense. As cyber threats continue to evolve, the integration of log correlation, timeline analysis, and the kill ...
1 month ago Cybersecuritynews.com
Bitwarden: how to create and use Passkeys to sign in - They can use a master password and improve security by adding a two-factor authentication option to the process. A private part of it never leaves the device, which means that all standard password attacks don't work against passkeys. I used the ...
1 year ago Ghacks.net
What Should We Expect for State and Local Government IT Priorities in 2024? - As we wrap up 2023, it is a great time to reflect on the current state of technology in state and local governments and look ahead to the priorities for the coming year. Maintaining the security of networks and the data they carry continues to be the ...
1 year ago Feedpress.me
Jason's Deli Restaurant Chain Hit by a Credential Stuffing Attack - The personal information of more than 340,000 customers of popular restaurant chain Jason's Deli may have been victims of a credential stuffing attack, a scheme in which the hacker uses stolen or leaked credentials to log into other online accounts. ...
1 year ago Securityboulevard.com
Fortifying cyber defenses: A proactive approach to ransomware resilience - Ransomware has become a pervasive threat, compromising the security and functionality of vital systems across the United States. While governmental pledges and public declarations of intent to fight cybercrime are foundational, they often lack the ...
1 year ago Helpnetsecurity.com
NASCIO, PTI on What's Coming in 2024 for State and Local IT - Every January, NASCIO and PTI release their forecasts for the coming year based on what government leaders are saying. Adobe Stock/OleCNX. When Doug Robinson speaks, the government technology community listens. He has been the exceptional executive ...
1 year ago Securityboulevard.com
How do I block Taylor Swift news from invading my Facebook timeline? - The short answer is that you can't block Taylor Swift from invading your Facebook line. Over the years, Facebook has tested features that allow users to mute certain words from appearing on a user's timeline Feed. In the old days, being able to ...
1 year ago Pandasecurity.com
BT Risks Fine As Huawei Removal Deadline Nears - UK carrier BT is at risk of a fine as it nears 31 December deadline to replace Huawei equipment from its core network. BT Group is at risk of financial penalties from the UK government, as it looks set to miss the 31 December to replace equipment ...
1 year ago Silicon.co.uk
UK sets out new cyber reporting requirements for critical infrastructure | The Record from Recorded Future News - The original law introduced duties for organizations in critical sectors to report cyber incidents to their regulators, but the thresholds for reportable incidents were based on the “interruption to the continuity of the essential or digital ...
1 month ago Therecord.media

Cyber Trends (last 7 days)