Introduction to cloud canaries
With Tracebit, canaries are no longer the preserve of highly resourced security teams.
We’ve written and collated a full set of handy resources to help explain what canaries are, why we’re so excited about them, and what you can do to get started with deploying them.
Why use canaries for intrusion detection?
An overview of the value of leveraging 'honeypots' or canaries for the purposes of intrusion detection.
Honeypots for Intrusion Detection
What's different about cloud canaries?
Why cloud infrastructure, continuous deployment and infrastructure as code can be leveraged to scale and make light weight what was previously a cumbersome technique.
Canary Infra: Bringing Honeypots towards general adoption
Should your internal users know you have canaries?
Balancing secrecy and discretion when communicating about a Tracebit deployment (or any other canary program) can seem like it might be challenging.
Here's the approach we recommend all our customers begin with.
Canary Program Communication: Secrecy vs. Discretion
How does your canary program stack up?
Honeypots have been around for forty years or so, but until now there's been no overarching framework, to show how a deployment can evolve.
Rami McCarthy outlines an approach to mapping the journey towards a comprehensive canary program.
The Security Canary Maturity Model
The latest security research straight to your inbox
Subscribe to your newsletter to receive regular updates from our research and product teams