CustomersPricingResearchAboutCareersContact
Company
  • About
  • Careers
  • Contact
Book a demo
Book a demo

Book a demo

See how canaries can enhance your security

Photo of Andy Smith

Andy Smith

CEO, Tracebit

Photo of Sam Cox

Sam Cox

CTO, Tracebit

Schedule a 45 minute personalised demo of Tracebit with one of our co-founders to:

  • Discuss your specific security challenges
  • Cover the range of canaries Tracebit can deploy for your use case
  • Walk through a simple Tracebit deployment

One of our co-founders will reply to you directly as soon as they see your request. No bots here! So please be patient if it takes us a few hours to get back to you.

Thank you for contacting us; a member of our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
All posts
Product

Canaries in the Wild - Episode 3: Mandy Andress

Andy Smith
November 18, 2025
November 18, 2025
•
2
min read
I am the text that will be copied.

Episode 3 of Canaries in the Wild is live. We sat down with Mandy Andress, CISO at Elastic, who has been working with deception technology since the early days of honeypots and honeynets.

Mandy brings a CISO's perspective on why canaries deserve a much larger role in modern security programs, and shares her views on how the fundamentals of detection are shifting as environments become more complex and threats evolve.

Honeypots vs Canaries

Mandy breaks down the key differences between honeypots and canaries, and explains how she thinks about prioritisation when building security programs

Assume breach and leaked credentials

She explains why assume breach is foundational and why behavioural analytics matters when attackers use leaked credentials—today's top entry point.

Canary use cases

From file shares to cloud accounts, Mandy walks through practical examples of where to deploy canaries and what makes them effective in production environments.

No-code vulnerabilities and AI agents

Mandy shares her perspective on the coming wave of security challenges: applications shipped with no-code tools, and autonomous AI agents operating across your infrastructure. She explains why it'll get worse before it gets better, and the role canaries will play in setting guardrails.

Listen to Episode 3 here.

Table of contents
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AboutBlogContactCareersStatusTrust & Security
Subscribe for research and product updates
By subscribing you agree to our Privacy Policy
Thank you! Check your inbox for your first edition
Oops! Something went wrong while submitting the form.
Subscribe
By subscribing you agree to our Privacy Policy
Thank you! Check your inbox for your first edition
Oops! Something went wrong while submitting the form.
© 2025 Tracebit. All rights reserved.
Privacy PolicyTerms of Service
AWS Qualified SoftwareSOC 2 Type 2