• 200 5th Avenue, 
    Waltham, MA — 02451
  • Copyright Allure Security Technology 2018.
    All Rights Reserved

Allure Security Blog

Subscribe to our blog >>>
January 04, 2019
Written by Salvatore Stolfo

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between losing mission-critical data and stopping...

December 20, 2018
Written by Salvatore Stolfo

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, who had been using fake documents to...

November 16, 2018
Written by Salvatore Stolfo

Enterprise Cloud Migration is Continuing -- With or Without Security

According to a new survey conducted by ESG, 75% of organizations reported that they believe that at least 20% of...

October 29, 2018
Written by Salvatore Stolfo

Insider Leaks: Why They Happen and How to Shut Them Down

Earlier this year, a study by the Ponemon Institute found that all types of insider threats are on the upswing....

October 23, 2018
Written by Salvatore Stolfo

Identifying Leakers and Hackers: Attribution and Beyond

Attribution of attackers and uncovering their true identities remains a challenge for incident response teams. But...

October 16, 2018
Written by Salvatore Stolfo

Got Honey Headaches? Try Decoy Documents

Get deception without the hassle of creating and maintaining honey environments

October 09, 2018
Written by Salvatore Stolfo

Cybersecurity Awareness Month: Time to Embrace Detection and Response

October is “Cybersecurity Awareness Month,” created in 2004 by the Department of Homeland Security and the National...

August 06, 2018
Written by Salvatore Stolfo

Cyberwarfare renews focus on stolen credentials

Everything old is new again, and Russia’s involvement in the U.S.’s electoral process has put the old attack vector...

July 13, 2018
Written by Salvatore Stolfo

Nation-State Attack Against U.S. Navy Exposes the Weakest Link: Third-Party Contractors

In June, the Washington Post covered the revelation that the Chinese government successfully breached an unnamed...

July 06, 2018
Written by Salvatore Stolfo

CCPA: More Reason for real-time breach detection

The first GDRP-like law passed in California, the California Consumer Privacy Act of 2018,  which will undoubtedly...