
Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]
CyberWire Daily
Differentiating Malicious Traffic in IoT Networks
This chapter explores strategies for distinguishing between harmful and routine IoT network activity using a honeypot fleet. It focuses on establishing a baseline for normal behavior to improve detection of targeted threats and enhances the understanding of customer vulnerabilities.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.