CustomersPricingResearchAboutCareersContact
Company
  • About
  • Careers
  • Contact
Book a demo
Book a demo

Book a demo

See how canaries can enhance your security

Photo of Andy Smith

Andy Smith

CEO, Tracebit

Photo of Sam Cox

Sam Cox

CTO, Tracebit

Schedule a 45 minute personalised demo of Tracebit with one of our co-founders to:

  • Discuss your specific security challenges
  • Cover the range of canaries Tracebit can deploy for your use case
  • Walk through a simple Tracebit deployment

One of our co-founders will reply to you directly as soon as they see your request. No bots here! So please be patient if it takes us a few hours to get back to you.

Thank you for contacting us; a member of our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
All posts
Product

Canaries in the Wild - Episode 2: Josh Yavor

Andy Smith
October 13, 2025
October 13, 2025
•
2
min read
I am the text that will be copied.

Episode 2 is live. We sat down with Josh Yavor, CEO and Co-Founder of Credible Security, who has more than a decade of experience with deception technology.

Josh brings a practitioner's perspective, having deployed everything from complex malware analysis environments to lightweight canary tokens across different organisations. He shares what he's learned about making deception technology work in the real world.

Why deception isn't just for mature programs

Josh tackles a common misconception in the industry: that canaries are something you deploy later in your security journey. He explains why the opposite is often true, and shares examples of simple, high-value deployments that any organisation can implement.

Real signals vs. industry reports

Josh explains the difference between reading annual threat intelligence reports and having actual signals from your own environment. He shares why that distinction matters for prioritising security work.

If it doesn't fire, is it working?

Josh addresses a question that comes up often: if a canary doesn't trigger, has it provided value? He explains why absence of signal doesn't mean absence of value, and shares his perspective on what makes canaries different from other security tools when it comes to signal-to-noise ratios.

Creative deployments

Josh walks through some unusual use cases he's deployed, including protecting sensitive IP during third-party data sharing and using canaries during active incident response. These stories show how flexible deception technology can be when you think creatively about the problems you're trying to solve.

Listen to Episode 2 here.

Table of contents
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AboutBlogContactCareersStatusTrust & Security
Subscribe for research and product updates
By subscribing you agree to our Privacy Policy
Thank you! Check your inbox for your first edition
Oops! Something went wrong while submitting the form.
Subscribe
By subscribing you agree to our Privacy Policy
Thank you! Check your inbox for your first edition
Oops! Something went wrong while submitting the form.
© 2025 Tracebit. All rights reserved.
Privacy PolicyTerms of Service
AWS Qualified SoftwareSOC 2 Type 2