CyberWire Daily cover image

Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]

CyberWire Daily

CHAPTER

Differentiating Malicious Traffic in IoT Networks

This chapter explores strategies for distinguishing between harmful and routine IoT network activity using a honeypot fleet. It focuses on establishing a baseline for normal behavior to improve detection of targeted threats and enhances the understanding of customer vulnerabilities.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner