<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/canaries-in-the-wild" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Canaries In The Wild</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/canaries-in-the-wild</itunes:new-feed-url>
    <description>Conversations with security leaders and practitioners about their real-world experience of canaries and honeypots.

Our guests share tactics, detection stories, and lessons learned from production deployments - ranging from technical details to the role deception plays in their defensive strategy, we explore the reality of 'canaries in the wild'.

From the team at Tracebit.</description>
    <copyright>© 2026 Tracebit</copyright>
    <podcast:guid>cf9c5b8c-976f-5056-814d-b9e3923873d9</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Tue, 10 Feb 2026 11:30:05 +0000</pubDate>
    <lastBuildDate>Tue, 10 Feb 2026 11:31:42 +0000</lastBuildDate>
    <link>https://tracebit.com/</link>
    <image>
      <url>https://img.transistorcdn.com/BQIxcLmWcEu8RQQ_8co5kO5h7fIMdHLXD7x0foEOMp0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zN2Ji/OTg0MDU1YmU4MmE0/YjUyMWY0MTQxN2Zk/ZWMzMC5wbmc.jpg</url>
      <title>Canaries In The Wild</title>
      <link>https://tracebit.com/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Tracebit</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/BQIxcLmWcEu8RQQ_8co5kO5h7fIMdHLXD7x0foEOMp0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zN2Ji/OTg0MDU1YmU4MmE0/YjUyMWY0MTQxN2Zk/ZWMzMC5wbmc.jpg"/>
    <itunes:summary>Conversations with security leaders and practitioners about their real-world experience of canaries and honeypots.

Our guests share tactics, detection stories, and lessons learned from production deployments - ranging from technical details to the role deception plays in their defensive strategy, we explore the reality of 'canaries in the wild'.

From the team at Tracebit.</itunes:summary>
    <itunes:subtitle>Conversations with security leaders and practitioners about their real-world experience of canaries and honeypots.</itunes:subtitle>
    <itunes:keywords>Technology, Cyber, Security, Canaries, Hacking</itunes:keywords>
    <itunes:owner>
      <itunes:name>Andy Smith</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Kevin Conley - Thinking Like an Attacker and the Psychological Power of Deception</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Kevin Conley - Thinking Like an Attacker and the Psychological Power of Deception</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">68ec8ed8-d27c-41d7-8f39-d8b004cf229b</guid>
      <link>https://share.transistor.fm/s/955574d7</link>
      <description>
        <![CDATA[<p>Our latest episode features Kevin Conley, Team Lead and Principal Security Engineer of the Deception Technology team at Riot Games, who has built their canary program from the ground up over the past few years.</p><p>Kevin has spent years deploying and running deception at massive scale - protecting one of the world's largest gaming platforms with hundreds of millions of players. He brings practical experience from building the program and operating it day-to-day.</p><p>In this episode, Kevin breaks down why thinking like an attacker is fundamental to effective canary placement, how to measure deception program success, and the psychological impact of deception on attackers.</p><p>Timestamps:</p><p>00:00 Intro<br>01:32 Defining terms: canaries, decoys, honeypots, and deception<br>03:40 Kevin's journey to leading deception at Riot Games<br>05:40 Adopting an attacker's perspective: the fundamental mindset shift<br>07:46 Why benign positives validate your canary placement<br>08:50 Catching malicious activity and discovering unexpected environment usage<br>15:06 Measuring success: coverage and validation<br>17:59 Blind red team exercises and attacker awareness<br>20:02 The psychological power of deception on attackers<br>24:29 Catching attackers early in the attack chain<br>25:51 The ROI case: deploying where traditional tools can't reach<br>29:57 What to communicate internally about your deception program<br>38:35 Why the honeypots misconception hurts deception teams<br>39:46 Making the case: why every security team should use canaries<br>41:48 When to adopt deception in your security journey<br>43:58 The future of deception: redefining it as active defense<br>46:47 Closing </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Our latest episode features Kevin Conley, Team Lead and Principal Security Engineer of the Deception Technology team at Riot Games, who has built their canary program from the ground up over the past few years.</p><p>Kevin has spent years deploying and running deception at massive scale - protecting one of the world's largest gaming platforms with hundreds of millions of players. He brings practical experience from building the program and operating it day-to-day.</p><p>In this episode, Kevin breaks down why thinking like an attacker is fundamental to effective canary placement, how to measure deception program success, and the psychological impact of deception on attackers.</p><p>Timestamps:</p><p>00:00 Intro<br>01:32 Defining terms: canaries, decoys, honeypots, and deception<br>03:40 Kevin's journey to leading deception at Riot Games<br>05:40 Adopting an attacker's perspective: the fundamental mindset shift<br>07:46 Why benign positives validate your canary placement<br>08:50 Catching malicious activity and discovering unexpected environment usage<br>15:06 Measuring success: coverage and validation<br>17:59 Blind red team exercises and attacker awareness<br>20:02 The psychological power of deception on attackers<br>24:29 Catching attackers early in the attack chain<br>25:51 The ROI case: deploying where traditional tools can't reach<br>29:57 What to communicate internally about your deception program<br>38:35 Why the honeypots misconception hurts deception teams<br>39:46 Making the case: why every security team should use canaries<br>41:48 When to adopt deception in your security journey<br>43:58 The future of deception: redefining it as active defense<br>46:47 Closing </p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 11:30:00 +0000</pubDate>
      <author>Tracebit</author>
      <enclosure url="https://media.transistor.fm/955574d7/96050970.mp3" length="61853956" type="audio/mpeg"/>
      <itunes:author>Tracebit</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CccAZJTmG7IoSplFSyYuFDMkqf99-AHWjmvym6YSKJw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2Nj/Y2EwYjZlYTljNTg5/Y2Y4ZGM5ZmEyNTRj/ODI1Ni5wbmc.jpg"/>
      <itunes:duration>2558</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Our latest episode features Kevin Conley, Team Lead and Principal Security Engineer of the Deception Technology team at Riot Games, who has built their canary program from the ground up over the past few years.</p><p>Kevin has spent years deploying and running deception at massive scale - protecting one of the world's largest gaming platforms with hundreds of millions of players. He brings practical experience from building the program and operating it day-to-day.</p><p>In this episode, Kevin breaks down why thinking like an attacker is fundamental to effective canary placement, how to measure deception program success, and the psychological impact of deception on attackers.</p><p>Timestamps:</p><p>00:00 Intro<br>01:32 Defining terms: canaries, decoys, honeypots, and deception<br>03:40 Kevin's journey to leading deception at Riot Games<br>05:40 Adopting an attacker's perspective: the fundamental mindset shift<br>07:46 Why benign positives validate your canary placement<br>08:50 Catching malicious activity and discovering unexpected environment usage<br>15:06 Measuring success: coverage and validation<br>17:59 Blind red team exercises and attacker awareness<br>20:02 The psychological power of deception on attackers<br>24:29 Catching attackers early in the attack chain<br>25:51 The ROI case: deploying where traditional tools can't reach<br>29:57 What to communicate internally about your deception program<br>38:35 Why the honeypots misconception hurts deception teams<br>39:46 Making the case: why every security team should use canaries<br>41:48 When to adopt deception in your security journey<br>43:58 The future of deception: redefining it as active defense<br>46:47 Closing </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber, Security, Canaries, Hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mandy Andress: Assume Breach, High Fidelity Alerts and Guardrails for AI Agents</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Mandy Andress: Assume Breach, High Fidelity Alerts and Guardrails for AI Agents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9852cb8e-c1ad-4ae0-8d27-f68f0dcab45e</guid>
      <link>https://share.transistor.fm/s/51658f21</link>
      <description>
        <![CDATA[<p>Andy sits down with Mandy Andress (CISO, Elastic) who has been working with deception technology since the early days of honeypots and honeynets.<br>Mandy brings a CISO's perspective on why canaries deserve a much larger role in modern security programs, and shares her views on how the fundamentals of detection are shifting as environments become more complex and threats evolve.</p><p><strong>Timestamps:</strong><br>00:00 Intro<br>02:05 Honeypots vs canaries—different objectives, different priorities<br>05:22 Why assume breach is foundational in modern security<br>10:45 High fidelity alerts: reducing time to investigation<br>15:50 Practical canary deployments—S3 buckets, file shares, and cloud accounts<br>18:30 No-code vulnerabilities and the coming security challenges<br>19:55 AI agents going rogue—using canaries as guardrails<br>22:11 What to communicate internally about your canary program<br>26:16 Best advice: just get started—it's simpler than you think (edited) </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Andy sits down with Mandy Andress (CISO, Elastic) who has been working with deception technology since the early days of honeypots and honeynets.<br>Mandy brings a CISO's perspective on why canaries deserve a much larger role in modern security programs, and shares her views on how the fundamentals of detection are shifting as environments become more complex and threats evolve.</p><p><strong>Timestamps:</strong><br>00:00 Intro<br>02:05 Honeypots vs canaries—different objectives, different priorities<br>05:22 Why assume breach is foundational in modern security<br>10:45 High fidelity alerts: reducing time to investigation<br>15:50 Practical canary deployments—S3 buckets, file shares, and cloud accounts<br>18:30 No-code vulnerabilities and the coming security challenges<br>19:55 AI agents going rogue—using canaries as guardrails<br>22:11 What to communicate internally about your canary program<br>26:16 Best advice: just get started—it's simpler than you think (edited) </p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Nov 2025 12:00:00 +0000</pubDate>
      <author>Tracebit</author>
      <enclosure url="https://media.transistor.fm/51658f21/63c83b2b.mp3" length="41064969" type="audio/mpeg"/>
      <itunes:author>Tracebit</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wkNaextkpIoO_URN-Z09RXwlhLYKE6JfdVz5NLPChBg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMDYw/ZmU2NzQ4YzAwZTNk/YzQ5MDQ1MzY2Y2Fj/MWJmNy5wbmc.jpg"/>
      <itunes:duration>1700</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Andy sits down with Mandy Andress (CISO, Elastic) who has been working with deception technology since the early days of honeypots and honeynets.<br>Mandy brings a CISO's perspective on why canaries deserve a much larger role in modern security programs, and shares her views on how the fundamentals of detection are shifting as environments become more complex and threats evolve.</p><p><strong>Timestamps:</strong><br>00:00 Intro<br>02:05 Honeypots vs canaries—different objectives, different priorities<br>05:22 Why assume breach is foundational in modern security<br>10:45 High fidelity alerts: reducing time to investigation<br>15:50 Practical canary deployments—S3 buckets, file shares, and cloud accounts<br>18:30 No-code vulnerabilities and the coming security challenges<br>19:55 AI agents going rogue—using canaries as guardrails<br>22:11 What to communicate internally about your canary program<br>26:16 Best advice: just get started—it's simpler than you think (edited) </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber, Security, Canaries, Hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Josh Yavor: High Signal, Low Noise - The Case for Early Canary Deception</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Josh Yavor: High Signal, Low Noise - The Case for Early Canary Deception</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92b7f1d8-e86e-475d-ba7b-860134f104e4</guid>
      <link>https://share.transistor.fm/s/e80e557e</link>
      <description>
        <![CDATA[<p>Andy sits down with Josh Yavor (CEO, Credible Security) to discuss his experience of a decade of deploying deception technology. From building complex malware analysis environments to protecting sensitive IP during third-party data sharing, Josh explains why canaries deliver high-value signals early in your security journey and shares creative use cases including using canaries during active incident response. </p><p>=================<br>🔍 IN THIS EPISODE<br>=================</p><p>🪶 Why deception isn’t just for “mature” security programs<br>📡 Real signals vs. industry reports — what matters more<br>🔇 Why absence of alerts doesn’t mean absence of value<br>💡 Creative deployments — from protecting IP to incident response<br>🧭 Lessons from a decade of making deception work in the real world</p><p>============================================================</p><p>00:00 Intro<br>02:05 Why deception isn’t just for mature programs<br>06:40 Real signals vs. industry reports<br>10:20 “If it doesn’t fire, is it working?” — why absence of signal doesn’t mean absence of value<br>15:50 Creative deployments — canaries for IP protection &amp; incident response<br>22:10 Lessons from a decade of deception</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Andy sits down with Josh Yavor (CEO, Credible Security) to discuss his experience of a decade of deploying deception technology. From building complex malware analysis environments to protecting sensitive IP during third-party data sharing, Josh explains why canaries deliver high-value signals early in your security journey and shares creative use cases including using canaries during active incident response. </p><p>=================<br>🔍 IN THIS EPISODE<br>=================</p><p>🪶 Why deception isn’t just for “mature” security programs<br>📡 Real signals vs. industry reports — what matters more<br>🔇 Why absence of alerts doesn’t mean absence of value<br>💡 Creative deployments — from protecting IP to incident response<br>🧭 Lessons from a decade of making deception work in the real world</p><p>============================================================</p><p>00:00 Intro<br>02:05 Why deception isn’t just for mature programs<br>06:40 Real signals vs. industry reports<br>10:20 “If it doesn’t fire, is it working?” — why absence of signal doesn’t mean absence of value<br>15:50 Creative deployments — canaries for IP protection &amp; incident response<br>22:10 Lessons from a decade of deception</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 12:00:00 +0100</pubDate>
      <author>Tracebit</author>
      <enclosure url="https://media.transistor.fm/e80e557e/b205242d.mp3" length="57038762" type="audio/mpeg"/>
      <itunes:author>Tracebit</itunes:author>
      <itunes:duration>2332</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Andy sits down with Josh Yavor (CEO, Credible Security) to discuss his experience of a decade of deploying deception technology. From building complex malware analysis environments to protecting sensitive IP during third-party data sharing, Josh explains why canaries deliver high-value signals early in your security journey and shares creative use cases including using canaries during active incident response. </p><p>=================<br>🔍 IN THIS EPISODE<br>=================</p><p>🪶 Why deception isn’t just for “mature” security programs<br>📡 Real signals vs. industry reports — what matters more<br>🔇 Why absence of alerts doesn’t mean absence of value<br>💡 Creative deployments — from protecting IP to incident response<br>🧭 Lessons from a decade of making deception work in the real world</p><p>============================================================</p><p>00:00 Intro<br>02:05 Why deception isn’t just for mature programs<br>06:40 Real signals vs. industry reports<br>10:20 “If it doesn’t fire, is it working?” — why absence of signal doesn’t mean absence of value<br>15:50 Creative deployments — canaries for IP protection &amp; incident response<br>22:10 Lessons from a decade of deception</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber, Security, Canaries, Hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Didier Vandenbroeck: Catching Red Teams, Insider Threat and the ROI of Canaries</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Didier Vandenbroeck: Catching Red Teams, Insider Threat and the ROI of Canaries</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b07b46fd-9b70-467e-99d0-d07f7a8c97fd</guid>
      <link>https://share.transistor.fm/s/ca9cc7fe</link>
      <description>
        <![CDATA[<p>Andy sits down with Didier Vanderbroeck (VP Security &amp; IT, Oleria) to discuss the value he's seen from canaries as a detection mechanism over a 25 year career in security.</p><p>Ranging from getting caught by Salesforce's honeypots while running red-teaming post-Slack acquisition, to what AI means for the future of deception technology; Didier shares his insights on what it means to Assume Breach with canaries.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Andy sits down with Didier Vanderbroeck (VP Security &amp; IT, Oleria) to discuss the value he's seen from canaries as a detection mechanism over a 25 year career in security.</p><p>Ranging from getting caught by Salesforce's honeypots while running red-teaming post-Slack acquisition, to what AI means for the future of deception technology; Didier shares his insights on what it means to Assume Breach with canaries.</p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Sep 2025 17:02:33 +0100</pubDate>
      <author>Tracebit</author>
      <enclosure url="https://media.transistor.fm/ca9cc7fe/4c90ebaa.mp3" length="52275052" type="audio/mpeg"/>
      <itunes:author>Tracebit</itunes:author>
      <itunes:duration>2151</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Andy sits down with Didier Vanderbroeck (VP Security &amp; IT, Oleria) to discuss the value he's seen from canaries as a detection mechanism over a 25 year career in security.</p><p>Ranging from getting caught by Salesforce's honeypots while running red-teaming post-Slack acquisition, to what AI means for the future of deception technology; Didier shares his insights on what it means to Assume Breach with canaries.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber, Security, Canaries, Hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ca9cc7fe/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ca9cc7fe/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ca9cc7fe/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ca9cc7fe/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ca9cc7fe/transcription" type="text/html"/>
    </item>
  </channel>
</rss>
