ALLURE SECURITY BLOG

Securing cloud data, beyond PII

How Columbia University approaches cloud data security
Read More

Try the Free Allure Beaconizer: Track Docs, Detect and Respond to Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized ...
Read More

ESG Infographic: Securing Sensitive Data in the Cloud

ESG recently conducted a survey aimed at better understanding the data ...
Read More

Enterprise Cloud Migration is Continuing -- With or Without Security

According to a new survey conducted by ESG, 75% of organizations reported ...
Read More

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a ...
Read More

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey ...
Read More

Cyberwarfare renews focus on stolen credentials

Everything old is new again, and Russia’s involvement in the U.S.’s ...
Read More

GDPR compliance drives need for advanced data Loss solutions

It is now June, 2018 and GDPR has arrived and is already in full force. It ...
Read More