• 200 5th Avenue, 
    Waltham, MA — 02451
  • Copyright Allure Security Technology 2018.
    All Rights Reserved

Allure Security Blog

Subscribe to our blog >>>
January 04, 2019
Written by Salvatore Stolfo

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between losing mission-critical data and stopping...

December 20, 2018
Written by Salvatore Stolfo

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, who had been using fake documents to...

December 17, 2018
Written by Mikala Vidal

Try the Free Allure Beaconizer: Track Docs, Detect and Respond to Breaches, Identify Attackers

Using the Allure Beaconizer, users can upload documents to be beaconized for free with Allure’s patented,...

December 04, 2018
Written by Mikala Vidal

ESG Infographic: Securing Sensitive Data in the Cloud

ESG recently conducted a survey aimed at better understanding the data security challenges organizations are facing...

November 16, 2018
Written by Salvatore Stolfo

Enterprise Cloud Migration is Continuing -- With or Without Security

According to a new survey conducted by ESG, 75% of organizations reported that they believe that at least 20% of...

October 29, 2018
Written by Salvatore Stolfo

Insider Leaks: Why They Happen and How to Shut Them Down

Earlier this year, a study by the Ponemon Institute found that all types of insider threats are on the upswing....

October 23, 2018
Written by Salvatore Stolfo

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a challenge for incident response teams. But...

October 16, 2018
Written by Salvatore Stolfo

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey environments

October 09, 2018
Written by Salvatore Stolfo

Cybersecurity Awareness Month: Time to Embrace Detection and Response

October is “Cybersecurity Awareness Month,” created in 2004 by the Department of Homeland Security and the National...

August 06, 2018
Written by Salvatore Stolfo

Cyberwarfare renews focus on stolen credentials

Everything old is new again, and Russia’s involvement in the U.S.’s electoral process has put the old attack vector...