Posted on January 31, 2025 by Kevin Leary -
Wireless threats are growing rapidly, leaving enterprise environments increasingly vulnerable to sophisticated attacks.
Hosted by Dr. Brett Walkenhorst, CTO, and Rahul Nagraj, Director of Engineering, this session provides you with essential updates on the latest advancements in wireless airspace defense.
This session includes a live demonstration of the latest Bastille’s Wireless Airspace Defense capabilities in action.
What You’ll Learn
- Insights into evolving wireless vulnerabilities, including Evil Twin attacks, hotspot data exfiltration, and the Nearest Neighbour Attack.
- How Bastille’s patented technologies—Massive Multi-Channel Demodulation (M2CD) and Cellular Detection & Localization (CD&L)—enhance visibility and response to wireless threats.
- Strategies to mitigate risks posed by unmanaged devices, insider threats, and shadow IT.
- Real-world examples of wireless threats and how to address them effectively.
Live Demonstration
The webinar will feature a real-time demonstration of Bastille’s Wireless Airspace Defense solutions.
See how Bastille detects, localizes, and mitigates risks, including how it protects against threats like the Nearest Neighbour Attack, which exploits dual-homed devices to infiltrate networks from adjacent locations.
Who Should Attend
This session is tailored for cybersecurity professionals, IT managers, and security architects seeking effective strategies to address wireless security challenge
Posted on December 10, 2024 by Miranda -
This solution brief highlights the growing risks of wireless threats to enterprises, emphasizing the need for continuous monitoring and comprehensive security measures to protect against unauthorized access, data breaches, and device vulnerabilities.
Posted on December 10, 2024 by Miranda -
Contraband cell phones pose serious security risks in correctional facilities, enabling inmates to bypass monitoring systems, coordinate crimes, and maintain outside connections. Detecting and confiscating these devices is a critical challenge.
Posted on November 22, 2024 by Kevin Leary -
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.
In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats.
WIDS – an introduction
Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment in security cameras, access control and other forms of perimeter security.
Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen.
How can Bastille help?
Bastille can help you by displaying wireless devices as dots on a floor-plan map, accurately showing their location within a defined space. The system can also be configured to alert when a device is found where it shouldn’t be or suddenly moves to a restricted area, such as within a geo-fenced space – inside a data center. Better still, since all this is recorded, you can go back in time using our DVR function to see when and where a device first entered your secure data center.
Wireless Devices Located include:
- Cell Phones: Individual phones located in real-time just by their cellular signal
- Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear
- Personal Medical Devices: e.g. Hearing aids
- Laptops & Tablets
- USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities
- Any device emitting Cellular, Wi-Fi, Bluetooth or BLE
Top Data Center Use Cases include:
- Enforce No Cell Phone Policy or Nuanced Wireless Device Policies
- Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi
- Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots
- WIDS Compliance for Federal Customers’ Data
- Integrations with existing infrastructure e.g. Lenel, Genetec, Splunk, Palo Alto, Aruba, Cisco, Juniper and Axis
Speaker:
- Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Posted on November 18, 2024 by Miranda -
Get the latest Gartner report on the importance of wireless airspace defense. Simply fill out the form and we’ll send you the report.
Posted on November 15, 2024 by Miranda -
Posted on November 3, 2024 by Miranda -
Zero Trust requires visibility and detection across many facets of the internal networking environment. Learn how Bastille provides unparalleled visibility to enhance a Zero Trust Architecture with detection and geolocation for wireless devices, including Wi-Fi, cellular, Bluetooth, BLE, and IoT.
Posted on November 3, 2024 by Miranda -
A recent memorandum from the Secretary of Defense discussed wireless intrusion detection systems (WIDS) in sensitive and special access facilities. Learn how Bastille is uniquely qualified to address the SECDEF’s requirements for sensitive compartmented information facilities (SCIFs) and special access program facilities (SAPFs).
Posted on November 3, 2024 by Miranda -
The RF landscape is continually evolving, from cellular and Bluetooth to Wi-Fi and IoT. This whitepaper summarizes the research that Bastille presented at Blackhat and DefCon in 2023, covering various Wireless Airspace Defense topics on securing wireless devices.
Posted on November 3, 2024 by Miranda -
Radio-frequency (RF) devices help automate our work and personal lives. From RF-enabled TV remote controls to wireless mice, keyboards, lights, and building control systems, radios offer convenient wireless communications. Learn about the latest IoT RF threats that affect billions of devices, their users, and the organizations that they are connected to and depend upon.