Episodes
Risks of AI Smart Glasses
AI-powered glasses are no longer sci-fi — they're in your office right now. This episode breaks down why these wearables represent a security threat most organizations aren't prepared for, from invisible recording in ban zones to data exfiltration that bypasses your entire network stack.
Episode 1Smartwatches: The Trojan Watch
Your biggest security vulnerability might be on someone's wrist. This episode makes the case that the smartwatch is a persistent multi-radio transmitter operating completely outside your corporate security perimeter — a shadow device beaming data to the cloud while your firewalls watch helplessly.
About
The Wireless Threat Series podcast with Jon Bundy is a cybersecurity podcast produced by Bastille that analyzes every-day items that introduce real-world threats and provides actionable insights for security professionals. Hosted by Jon Bundy from Bastille and Adrian Sanabria, the principal researcher at the Defenders Initiative, the show examines current espionage cases, insider threats, and security breaches to reveal critical vulnerabilities in organizational security postures.
Each episode features a different wireless threat and focuses on translating complex technologies into actionable guidance, with particular emphasis on wireless security threats, SCIF protection, and insider threat detection. The podcast serves as an educational resource for security leaders managing classified environments, defense contractors, and organizations dealing with sophisticated threat actors.
Hosted By
Jon Bundy
Jon is a cybersecurity engineer and architect with expertise in security, OT, ICS, SCADA, IT, networking, Linux, databases, scripting, and other technical domains. His specialty is Wireless Airspace Cybersecurity, where he researches wireless protocols to understand their behavior and develops detection techniques for malicious activity and various wireless attacks.
Adrian Sanabria
Adrian is the Principal Researcher at The Defenders Initiative, a firm he founded to feature and support decades of cybersecurity research. His foundation spans technical, GRC, and leadership roles with a background as a practitioner, incident responder, penetration tester, and PCI QSA.