ALLURE SECURITY BLOG

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between ...
Read More

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, ...
Read More

Try the Free Allure Beaconizer: Track Docs, Detect and Respond to Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized ...
Read More

Active Defense with Deception Technology

As Gandhi once said, "An eye for an eye will only make the whole world ...
Read More