ALLURE SECURITY BLOG

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, ...
Read More

Free Allure Beaconizer: Track Docs, Detect Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized ...
Read More

ESG Infographic: Securing Sensitive Data in the Cloud

ESG recently conducted a survey aimed at better understanding the data ...
Read More

Enterprise Cloud Migration is Continuing -- With or Without Security

According to a new survey conducted by ESG, 75% of organizations reported ...
Read More

Insider Leaks: Why They Happen and How to Shut Them Down

Earlier this year, a study by the Ponemon Institute found that all types of ...
Read More

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a ...
Read More

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey ...
Read More

Cybersecurity Awareness Month: Time to Embrace Detection and Response

October is “Cybersecurity Awareness Month,” created in 2004 by the ...
Read More