top of page

Facial Recognition Feature on Galaxy S8 Bypassed Using Just a Photo

Just because an authentication mechanism is based on some form of biometrics, do not automatically assume it is more secure.  Take the time to understand the technology in play before adopting it as a primary defense for your sensitive data.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d

Comments


bottom of page