BLOG

17 - December 2018

Free Allure Beaconizer: Track Docs, Detect Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized for free with Allure’s patented, award-winning technology. Once beaconized, the documents will send alerts with proprietary…

LEARN MORE
4 - December 2018

ESG Infographic: Securing Sensitive Data In The Cloud

ESG recently conducted a survey aimed at better understanding the data security challenges organizations are facing as they migrate sensitive data to the cloud. Findings show…

LEARN MORE
16 - November 2018

Enterprise Cloud Migration Is Continuing — With Or Without Security

According to a new survey conducted by ESG, 75% of organizations reported that they believe that at least 20% of their sensitive data stored in public…

LEARN MORE
29 - October 2018

Insider Leaks: Why They Happen And How To Shut Them Down

Earlier this year, a study by the Ponemon Institute found that all types of insider threats are on the upswing. Insider threats can be external attackers who have…

LEARN MORE
23 - October 2018

Identifying Leakers And Hackers: Attribution And Beyond

Attribution of attackers and uncovering their true identities remains a challenge for incident response teams. But in a growing number of cases, attribution is becoming achievable.…

LEARN MORE
16 - October 2018

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey environments The inability to detect and understand modern attacker-type breaches has created new interest in deception…

LEARN MORE

FOLLOW OUR BLOG

CONTACT US

ALLURE HEADQUARTERS:200 5th Avenue, Waltham, MA 02451
Directions
Phone Number - (877) 669-8883