Using deception to catch Shai-Hulud‍
  ·  
Webinar / 3rd April
Sign up now
Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
All posts
·
Product

Canaries in the Wild - Episode 3: Mandy Andress

Andy Smith

November 18, 2025

March 10, 2026

·

2

min read

I am the text that will be copied.
"We just need to take it as a given and assume breach"

Episode 3 of Canaries in the Wild is live. We sat down with Mandy Andress, CISO at Elastic, who has been working with deception technology since the early days of honeypots and honeynets.

Mandy brings a CISO's perspective on why canaries deserve a much larger role in modern security programs, and shares her views on how the fundamentals of detection are shifting as environments become more complex and threats evolve.

Honeypots vs Canaries

Mandy breaks down the key differences between honeypots and canaries, and explains how she thinks about prioritisation when building security programs

Assume breach and leaked credentials

She explains why assume breach is foundational and why behavioural analytics matters when attackers use leaked credentials—today's top entry point.

Canary use cases

From file shares to cloud accounts, Mandy walks through practical examples of where to deploy canaries and what makes them effective in production environments.

No-code vulnerabilities and AI agents

Mandy shares her perspective on the coming wave of security challenges: applications shipped with no-code tools, and autonomous AI agents operating across your infrastructure. She explains why it'll get worse before it gets better, and the role canaries will play in setting guardrails.

Listen Now

Listen to Episode 3 here.

Table of contents
Subscribe to our newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to our privacy policy
Thank you for signing up
Something went wrong, please try again
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The latest security research straight to your inbox

Subscribe to our newsletter to receive regular updates from our research and product teams

By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition.
Oops! Something went wrong while submitting the form.
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings