ALLURE SECURITY BLOG

ESG Infographic: Securing Sensitive Data in the Cloud

ESG recently conducted a survey aimed at better understanding the data ...
Read More

Enterprise Cloud Migration is Continuing -- With or Without Security

According to a new survey conducted by ESG, 75% of organizations reported ...
Read More

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a ...
Read More

Cybersecurity Awareness Month: Time to Embrace Detection and Response

October is “Cybersecurity Awareness Month,” created in 2004 by the ...
Read More

Cyberwarfare renews focus on stolen credentials

Everything old is new again, and Russia’s involvement in the U.S.’s ...
Read More

Nation-State Attack Against U.S. Navy Exposes the Weakest Link: Third-Party Contractors

In June, the Washington Post covered the revelation that the Chinese ...
Read More

CCPA: More Reason for real-time breach detection

The first GDRP-like law passed in California, the California Consumer ...
Read More

Four Lessons from Tesla’s Insider Breach

Tesla has filed a lawsuit against the employee CEO Elon Musk said “committed ...
Read More