Wireless is the Last Mile of Attack

Secure facilities continue to face wireless activity that operates beyond the reach of traditional physical and cybersecurity tools. Recent findings—from wireless exploitation incidents at the UN, to the global impact of Pegasus, to the emergence of the Nearest Neighbor Attack—illustrate how small devices can create outsized risks in controlled spaces. Modern portable electronics broadcast constantly, even when users believe they are off. These emissions can expose sensitive movement patterns, enable device-to-device compromise, or open pathways into areas not designed to…

Keeping Track of What’s Really Going On In Your AI Data Centers

AI-powered data centers are fast becoming the most valuable (and most targeted) assets in the enterprise. With centralized AI models, customer data, and proprietary algorithms stored in these facilities, attackers are finding new ways to breach defenses, not just through networks, but through the airspace. Wireless signals like cellular, Wi-Fi, Bluetooth, and IoT protocols can be exploited for data exfiltration, rogue device access, and covert surveillance. Recent exploits such as the Nearest Neighbor attack show how invisible threats are becoming…

Finding Controlled Articles

Topic Covered Controlled Articles Definition Problem Context Regulatory Frameworks Detecting Controlled Articles Controlled Articles Policy Portable electronic devices (PED), both Government and personally owned, capable of recording information or transmitting data (e.g., audio, video, radio frequency, infrared, and/or data link electronic equipment) are not permitted in Limited Areas (LAs), Protected Areas (PAs), and Material Access Areas (MAAs), without prior approval documented in the approved Security Plan (SP). Wireless headsets and keyboards Smartwatches, Smart TVs Two-way radios Some medical devices Anything…

How Hackers Attack AI Data Centers with Wireless Devices

Presented in partnership with SC Media AI is transforming the data center landscape — and with it, the attack surface.From GPU-packed “AI factories” to liquid-cooled inference clusters, today’s AI data centers have become the crown jewels of modern infrastructure. But as power and density grow, so do the risks — particularly from wireless threats that often go unseen. In this discussion hosted by SC Media, industry leaders Bill Kleyman, CEO at Apolo, and Brett Walkenhorst, CTO at Bastille Networks, join Adrian Sanabria, host of the Enterprise Security Weekly podcast, to…

AI Data Center Wireless Airspace Defense

In today’s cloud environments, every application is dependent on infrastructure. “The Cloud” has evolved into a superset of enterprise data centers, co-location facilities, hosting environments, network exchanges, and SaaS platforms. Securing data centers from both physical and wireless threats is crucial. The industry has spent billions to make data centers among the most physically secure locations on the planet. Data center physical security is well-refined and involves identity scanners, physical blockades, trained guards, motion detectors, and comprehensive camera systems. Physical…

Securing AI Data Centers Against Wireless Threats

Data centers form the critical foundation of digital operations across industries, hosting sensitive information, enabling cloud services, and powering essential business functions. While data center operators have invested in strong perimeter and network defenses, wireless communication remains a largely unmonitored and highly exploitable attack surface. As wireless protocols and IoT devices proliferate across operational and IT environments, organizations require a new layer of defense: Wireless Airspace Defense. Bastille Networks provides the visibility, detection, and response capabilities to protect data centers…

Webinar – NIST SP 800-53 & Securing the Airwaves

Wireless devices are no longer just an accessory to the enterprise — they're embedded in our operations, facilities, and critical systems. From IoT sensors to personal hotspots, these devices often operate outside traditional network monitoring, creating blind spots that attackers can exploit. In this special session, former NIST Fellow Ron Ross — one of the nation's most influential cybersecurity leaders and the principal architect of the NIST Risk Management Framework — will discuss NIST SP 800-53 guidance and how it…

History of Wireless and RF Threats – Part 2

This webinar from Bastille focused on the timeline of wireless and RF threats, examining key milestones and notable events in cybersecurity history. The discussion was led by Justin Fry (CMO), Rodney Alto (CIA advisor), and Brett Walkenhorst (CTO), who explored how wireless threats have evolved from simple surveillance devices to sophisticated nation-state attacks. They emphasized that wireless signals are ubiquitous, invisible, and vulnerable to exploitation, with tens of billions of devices creating an ever-expanding attack surface that travels at the…

History of Wireless and RF Threats – Part 1

Explore the fascinating evolution of wireless and RF threats from their earliest origins to today's sophisticated cyber landscape in this comprehensive webinar led by Bastille's CTO Brett Walkenhorst and former CIA executive Rodney Alto. The presentation traces key historical milestones including Marconi's first wireless hack in the early 1900s, the ingenious Soviet "Thing" listening device planted in the US Ambassador's residence in 1945, and the shocking discovery of hundreds of RF bugs embedded throughout the US Embassy building in Moscow…

WIDS in the Public Sector for Today’s Threats

Unmanaged wireless devices continue to pose significant risks to classified environments, making selecting and deploying an effective WIDS an important responsibility. If you are involved in specifying, approving, or managing WIDS deployments, this webinar will help you make informed decisions and avoid common implementation challenges. What You'll Learn A clear framework for evaluating WIDS capabilities aligned with DoD and agency policies Insights into the SECDEF Memo’s impact on portable device policies and WIDS requirements Real-world examples of WIDS deployments in…