Watch this video on YouTube
Upon detecting an uptick in interactions with deployed honeypots, what is the most appropriate course of action for a cloud service provider's security team to undertake?