ALLURE SECURITY BLOG

ESG Infographic: Securing Sensitive Data in the Cloud

ESG recently conducted a survey aimed at better understanding the data ...
Read More

Enterprise Cloud Migration is Continuing -- With or Without Security

According to a new survey conducted by ESG, 75% of organizations reported ...
Read More

Insider Leaks: Why They Happen and How to Shut Them Down

Earlier this year, a study by the Ponemon Institute found that all types of ...
Read More

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a ...
Read More

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey ...
Read More

Cybersecurity Awareness Month: Time to Embrace Detection and Response

October is “Cybersecurity Awareness Month,” created in 2004 by the ...
Read More

Cyberwarfare renews focus on stolen credentials

Everything old is new again, and Russia’s involvement in the U.S.’s ...
Read More

Nation-State Attack Against U.S. Navy Exposes the Weakest Link: Third-Party Contractors

In June, the Washington Post covered the revelation that the Chinese ...
Read More