BLOG

27 - March 2019

The Economic Impact Of Cybersecurity

As the world grapples with growing consumer privacy concerns and related regulations, combined with daily, costly data breaches, cybersecurity skills are in more demand than ever.…

LEARN MORE
6 - March 2019

Securing Cloud Data, Beyond PII

How Columbia University approaches cloud data security When it comes to protecting data in the cloud, regulations and the fines associated with non-compliance drive most buying…

LEARN MORE
16 - January 2019

Cloud File Sharing: Uncover Unknown Risk

The relentless move by enterprises to cloud storage comes at a price: a lack of visibility. Although all cloud storage providers log (almost) all actions by…

LEARN MORE
4 - January 2019

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between losing mission-critical data and stopping an attacker in his or her tracks. Research has shown that detecting attackers…

LEARN MORE
20 - December 2018

How The FBI Used A “Booby-Trapped” Document To Foil An Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, who had been using fake documents to swindle a company out of large sums of money, was…

LEARN MORE
17 - December 2018

Free Allure Beaconizer: Track Docs, Detect Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized for free with Allure’s patented, award-winning technology. Once beaconized, the documents will send alerts with proprietary…

LEARN MORE

FOLLOW OUR BLOG

CONTACT US

ALLURE HEADQUARTERS:200 5th Avenue, Waltham, MA 02451
Directions
Phone Number - (877) 669-8883