Menu

Google’s Cybersecurity Efforts to Include Mobile Devices as Security Keys

The News: New cybersecurity initiatives announced by Google at Google I/O include the capability for Android and iOS mobile devices to be used as security keys. One of several security announcements, this move is designed to help thwart phishing attacks. Learn more from DARKReading here.

Google’s Cybersecurity Efforts to Include Mobile Devices as Security Keys

Analyst Take: Google’s continual efforts to address new and varied cybersecurity challenges include several new initiatives announced recently at Google I/O. On the heels of the company’s adoption of the pledge to expand support for FIDO sign-in standards, Google revealed the upcoming capability to use Android and iOS mobile devices as security keys to thwart phishing attacks.

This change will essentially turn a user’s mobile device into a physical security key (like Google’s Titan Security Key, which plugs into a USB port) by using Bluetooth to verify their proximity to the device the user wants to log into. The new cybersecurity functionality will help prevent phishing attacks in which a user is tricked into approving a fraudulent sign-in on a distant browser. Protecting against these “person in the middle” attacks has become a priority as bad actors have adapted their methods to potentially work around SMS or Google Prompt security authentication systems.

This isn’t exactly breaking new ground, as Apple has used devices in this way for quite some time now, but I’m glad to see this move from Google.

Additional Cybersecurity Measures Announced at Google I/O

Google Prompt itself will see updated cybersecurity standards, the company announced, including expanded prompt challenge types that will be triggered by potentially fraudulent login attempts. One new challenge will require a user’s mobile device to be connected to the same Wi-Fi network as the device they are trying to log into (similar to the security key function, which uses Bluetooth). Additional cybersecurity measures include continued auto-enrollment of Google account users into two-step verification — which I love, increased anti-phishing protections in Google products such as Docs, Sheets, and Slides, and new privacy and security features for Android.

I’m excited to see Google keeping the ball rolling forward on this front. Privacy is a massive hot button these days and we know for certain that while consumers highly value privacy, they also want a convenient and streamlined user experience. These measures look to offer both.

Disclosure: Futurum Research is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of Futurum Research as a whole.

Other insights from Futurum Research:

New Google Cloud Organization, Global Strategic Customers and Industries, to be Led by Umesh Vemuri

Google Offices and Data Centers in the U.S. Share $9.5B in New Spending in 2022 as Google Expands Services and Pushes to Reach Carbon-Free Energy Usage Goals by 2030

Google Acquires Mandiant, Strengthening its Security Portfolio and Hoping to Snag Cloud Share

Image Credit: Google

Author Information

Shelly Kramer is a serial entrepreneur with a technology-centric focus. She has worked alongside some of the world’s largest brands to embrace disruption and spur innovation, understand and address the realities of the connected customer, and help navigate the process of digital transformation.

Related Insights
RSAC 2026: The AI 'Tragedy of the Commons' and the Future of Agentic Security
April 3, 2026

RSAC 2026: The AI ‘Tragedy of the Commons’ and the Future of Agentic Security

Fernando Montenegro and Mitch Ashley, VPs and Practice Leads at Futurum, convey their observations from the RSAC 2026 Conference, with a focus on AI and agentic security....
Can UK Public Sector Security Keep Up With Its Own Digital Growth?
April 2, 2026

Can UK Public Sector Security Keep Up With Its Own Digital Growth?

The UK public sector's complex digital infrastructure has outpaced manual audits. Palo Alto Networks offers visibility to uncover critical security gaps in government and NHS environments....
Are Browsers the New Enterprise Attack Surface No One Is Ready to Defend?
April 2, 2026

Are Browsers the New Enterprise Attack Surface No One Is Ready to Defend?

Browser security is now the primary enterprise attack surface, with 95% of organizations experiencing browser-originated incidents that legacy tools cannot defend....
CrowdStrike Deepens Agentic SOC Strategy Across Partners, Services, and Devices
April 1, 2026

CrowdStrike Deepens Agentic SOC Strategy Across Partners, Services, and Devices

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, examines CrowdStrike’s agentic SOC expansion across partners, IBM, and Intel, and what it means for security execution and...
LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?
April 1, 2026

LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, analyzes the LevelBlue SentinelOne partnership and its focus on integrating threat intelligence, AI detection, and response to improve...
Palo Alto Bets on Agentic Endpoints Before Anyone Else Does
April 1, 2026

Palo Alto Bets on Agentic Endpoints Before Anyone Else Does

Palo Alto Networks bets big on AI agent security through Koi acquisition, with CEO Nikesh Arora backing it with a $10M stock purchase, positioning the company as first to formally...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.