ALLURE SECURITY BLOG

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a ...
Read More

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey ...
Read More

Cybersecurity Awareness Month: Time to Embrace Detection and Response

October is “Cybersecurity Awareness Month,” created in 2004 by the ...
Read More

Cyberwarfare renews focus on stolen credentials

Everything old is new again, and Russia’s involvement in the U.S.’s ...
Read More

Nation-State Attack Against U.S. Navy Exposes the Weakest Link: Third-Party Contractors

In June, the Washington Post covered the revelation that the Chinese ...
Read More

CCPA: More Reason for real-time breach detection

The first GDRP-like law passed in California, the California Consumer ...
Read More

Four Lessons from Tesla’s Insider Breach

Tesla has filed a lawsuit against the employee CEO Elon Musk said “committed ...
Read More

GDPR compliance drives need for advanced data Loss solutions

It is now June, 2018 and GDPR has arrived and is already in full force. It ...
Read More