ALLURE SECURITY BLOG

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between ...
Read More

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, ...
Read More

Free Allure Beaconizer: Track Docs, Detect Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized ...
Read More

Active Defense with Deception Technology

As Gandhi once said, "An eye for an eye will only make the whole world ...
Read More