CyberWire Daily cover image

Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]

CyberWire Daily

00:00

Differentiating Malicious Traffic in IoT Networks

This chapter explores strategies for distinguishing between harmful and routine IoT network activity using a honeypot fleet. It focuses on establishing a baseline for normal behavior to improve detection of targeted threats and enhances the understanding of customer vulnerabilities.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app