Assumed Trust: The Most Exploited Weakness

In partnership with

Blu Dot surpasses 2,000% ROAS with self-serve CTV ads

Home furniture brand Blu Dot blew up on CTV with help from Roku Ads Manager. Here’s how:

After a test campaign reached 211,000 households and achieved 1,010% ROAS, the brand went all in to promote its annual sales event. It removed age and income constraints to expand reach and shifted budget to custom audiences and retargeting, where intent was strongest.

The results speak for themselves. As Blu Dot increased their investment by 10x, ROAS jumped to 2,308% and more page-view conversions surpassed 50,000.

“For CTV campaigns, Roku has been a top performer,” said Claire Folkestad, Paid Media Strategist, Blu Dot. “Comping to our other platforms, we have seen really strong ROAS… and highly efficient CPMs, lower than any other CTV partner we've worked with.”

Using Roku Ads Manager, the campaign moved from a pilot to a permanent performance engine for the brand.

Internal Traffic Is Often Trusted Blindly

Many networks assume that once inside, users and systems are safe. Attackers rely on this assumption to move freely after initial compromise.

Shared Credentials Multiply Exposure

Teams sharing admin accounts or service logins create invisible trust relationships. When one person is compromised, everyone is exposed.

Legacy Systems Bypass Modern Controls

Older applications may not support MFA or granular access control. They remain trusted simply because “they’ve always been there.”

One editor for writers, developers, and agents

Most doc tools make you choose: accessible for writers, or git-native for developers. Mintlify's editor does both. Writers get WYSIWYG editing, developers keep their git workflow, and AI agents contribute via MCP. Every change syncs both ways. Your whole team, in one place.

Device Trust Is Rarely Verified Continuously

A device approved once may remain trusted indefinitely. Compromised endpoints often maintain access long after infection.

Implicit Trust Speeds Lateral Movement

Flat architectures and open internal routing make it easy for attackers to pivot. Trust chains become attack paths.

Replace Assumption With Verification

Adopt continuous validation models. Verify identity, device health, and behavior every time access is requested. Trust should be earned repeatedly — not assumed permanently.

Renewals stop being a fire drill.

Most churn blindsides the CSM in renewal week. Champion left. Usage dropped. NPS slid months ago.

A colleague in Slack watches the signals around the clock. Your CSMs catch every risk months before renewal.

11,000+ teams use Viktor daily. SOC 2 certified. Your data never trains models.