Using deception to catch Shai-Hulud‍
  ·  
Webinar / 3rd April
Sign up now
Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
All posts
·
Product

Introducing "Canaries in the Wild"

Andy Smith

September 9, 2025

March 10, 2026

·

2

min read

I am the text that will be copied.
Canaries In The Wild, presented by Tracebit

We're launching Canaries in the Wild, a podcast about the untold wins teams are getting from deception technology.

Canaries and honeypots have some of the best ROI stories in security, but nobody's talking about them. We're changing that. We've lined up security practitioners and leaders who are actually deploying this tech in production to share what's actually working, what isn't, the attacks they caught that would've gone unnoticed, and the lessons they've learnt from deploying at scale.

Episode 1: Didier Vandenbroeck

Our first episode features Didier Vandenbroeck, VP of Security at Oleria and former red team leader at Salesforce. With 25 years in security spanning both offense and defense, Didier brings a perspective you don't often hear. Tune in to hear Didier share his experiences, including:

Why canaries were an immediate win at Oleria

Didier deployed canaries from day one across AWS, Okta, laptops, and databases at Oleria. He walks us through the decision to start early, and why the time investment was minimal compared to the security gains.

Getting caught by deception while on offense

During Salesforce's acquisition of Slack, Didier's red team was caught within weeks by canaries. He shares what that felt like from the attacker's perspective and the psychological impact it had on subsequent operations.

The reality of deploying at scale

He covers the ease of canary deployment, the internal value beyond red team testing (including alerts from curious engineers), and the critical importance of an assume breach mindset.

Listen Now

Episode 1 is live. Check it out here.

‍

Table of contents
Subscribe to our newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to our privacy policy
Thank you for signing up
Something went wrong, please try again
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The latest security research straight to your inbox

Subscribe to our newsletter to receive regular updates from our research and product teams

By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition.
Oops! Something went wrong while submitting the form.
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings