ALLURE SECURITY BLOG

The economic impact of cybersecurity

As the world grapples with ...
Read More

Securing cloud data, beyond PII

How Columbia University ...
Read More

Cloud File Sharing: Uncover Unknown Risk

The relentless move by enterprises to cloud storage comes at a price: a lack ...
Read More

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between ...
Read More

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, ...
Read More