We’ve just raised our Series A, led by FirstMark
Read announcement →
Meet us at RSA →
Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
All posts
·
Product

Canaries in the Wild - Episode 2: Josh Yavor

Andy Smith

October 13, 2025

March 10, 2026

·

2

min read

I am the text that will be copied.
"Absence of signal is actually a delightful change"

Episode 2 is live. We sat down with Josh Yavor, CEO and Co-Founder of Credible Security, who has more than a decade of experience with deception technology.

Josh brings a practitioner's perspective, having deployed everything from complex malware analysis environments to lightweight canary tokens across different organisations. He shares what he's learned about making deception technology work in the real world.

Why deception isn't just for mature programs

Josh tackles a common misconception in the industry: that canaries are something you deploy later in your security journey. He explains why the opposite is often true, and shares examples of simple, high-value deployments that any organisation can implement.

Real signals vs. industry reports

Josh explains the difference between reading annual threat intelligence reports and having actual signals from your own environment. He shares why that distinction matters for prioritising security work.

If it doesn't fire, is it working?

Josh addresses a question that comes up often: if a canary doesn't trigger, has it provided value? He explains why absence of signal doesn't mean absence of value, and shares his perspective on what makes canaries different from other security tools when it comes to signal-to-noise ratios.

Creative deployments

Josh walks through some unusual use cases he's deployed, including protecting sensitive IP during third-party data sharing and using canaries during active incident response. These stories show how flexible deception technology can be when you think creatively about the problems you're trying to solve.

Listen Now

Listen to Episode 2 here.

Table of contents
Subscribe to our newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to our privacy policy
Thank you for signing up
Something went wrong, please try again
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The latest security research straight to your inbox

Subscribe to our newsletter to receive regular updates from our research and product teams

By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition.
Oops! Something went wrong while submitting the form.
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings