Introduction to cloud canaries
With Tracebit, canaries are no longer the preserve of highly resourced security teams.
We’ve written and collated a full set of handy resources to help explain what canaries are, why we’re so excited about them, and what you can do to get started with deploying them.
Why use canaries for intrusion detection?
An overview of the value of leveraging 'honeypots' or canaries for the purposes of intrusion detection.

Honeypots for Intrusion Detection
A deep dive into what Honeypots are, why they're useful and how they're used for intrusion detection.
What’s different about cloud canaries?
Why cloud infrastructure, continuous deployment and infrastructure as code can be leveraged to scale and make light weight what was previously a cumbersome technique.

Canary Infra: Bringing Honeypots towards general adoption
Laying out why we think 'Canary Infra' is a game changer for honeypots and intrusion detection.
Should your internal users know you have canaries?
Balancing secrecy and discretion when communicating about a Tracebit deployment (or any other canary program) can seem like it might be challenging.
Here's the approach we recommend all our customers begin with.

Canary Program Communication: Secrecy vs. Discretion
We share the lessons learned from deploying canaries at scale - how to be thoughtful but pragmatic about some of the tradeoffs necessary.
How does your canary program stack up?
Honeypots have been around for forty years or so, but until now there's been no overarching framework, to show how a deployment can evolve.
Rami McCarthy outlines an approach to mapping the journey towards a comprehensive canary program.

The Security Canary Maturity Model
We lay out the different levels of maturity your organization may be at in their Security Canary Maturity, as well as discussing the value in maturity models themselves.
Canaries and ‘Moving Target Defence’
Here we explore some of the trends in 'automated moving target defence' and the role that Tracebit Canaries can play.

Pre-emptive cyber defense and security canaries
The role of automated moving target defence in protection against attacks.
The latest security research straight to your inbox
Subscribe to your newsletter to receive regular updates from our research and product teams

