Explore the fascinating evolution of wireless and RF threats from their earliest origins to today's sophisticated cyber landscape in this comprehensive webinar led by Bastille's CTO Brett Walkenhorst and former CIA executive Rodney Alto. The presentation traces key historical milestones including Marconi's first wireless hack in the early 1900s, the ingenious Soviet "Thing" listening device planted in the US Ambassador's residence in 1945, and the shocking discovery of hundreds of RF bugs embedded throughout the US Embassy building in Moscow…
Archives: Resources
WIDS in the Public Sector for Today’s Threats
Unmanaged wireless devices continue to pose significant risks to classified environments, making selecting and deploying an effective WIDS an important responsibility. If you are involved in specifying, approving, or managing WIDS deployments, this webinar will help you make informed decisions and avoid common implementation challenges. What You'll Learn A clear framework for evaluating WIDS capabilities aligned with DoD and agency policies Insights into the SECDEF Memo’s impact on portable device policies and WIDS requirements Real-world examples of WIDS deployments in…
Bastille Networks: A Comprehensive Wireless Intrusion Detection System
Executive Summary Wireless threats increasingly undermine enterprise security as organizations adopt Wi-Fi, Bluetooth, cellular, and IoT technologies. Bastille Networks offers a 100% passive, broadband Wireless Intrusion Detection System (WIDS) that delivers real-time monitoring, detection, analysis, investigation, and response capabilities. Covering 100 MHz to 7.125 GHz, Bastille provides enterprises with critical visibility into wireless activity, allowing rapid identification and mitigation of threats across all major wireless communication protocols. Traditional wired intrusion detection systems (IDS) and basic Wi-Fi monitoring tools fail to…
Wireless Airspace Cybersecurity
A workshop on wireless vulnerabilities and their impact on enterprise security, you'll learn how to identify risks, protect sensitive data and safeguard your organization against wireless threats beyond Wi-Fi. Speakers Joseph is a veteran cybersecurity professional with over 20 years of military and civilian experience. He retired as a Major from the US Army Reserve, serving 22 years in Counterintelligence, Military Intelligence, and Cybersecurity. He maintains the CISSP, CEH, and EnCE certifications, co-authored a book on Deception Technology, and is…
Nearest Neighbor Attacks
Cyber threats are evolving—attackers no longer need to be physically close to breach your wireless network. The Nearest Neighbor Attack redefines proximity, allowing hackers to exploit dual-homed devices and neighboring networks to infiltrate your infrastructure. As organizations become increasingly dependent on wireless connectivity, the risks of wireless-based cyber threats grow. One of the most concerning attacks today is the Nearest Neighbor Attack, which exploits the way devices connect and communicate over wireless networks. This webinar will delve into the security…
Data Center Security: Mitigating Wireless Threats & Threats From Unknown Assets
Attacks and attackers are growing more sophisticated, using advanced wireless techniques and breaching exposures in unknown assets. Learn more about these attacks in this latest webinar from Bastille and Sevco. We'll explore the latest in sophisticated threats to data centers from wireless attacks and how those converge with threats from unknown and potentially exposed assets in increasingly complex attack surfaces to threaten organizations. But there are steps you can take to defend against these threats, and we'll break down the…
Advanced Detection Analytics Module
Wireless threats are growing rapidly, leaving enterprise environments increasingly vulnerable to sophisticated attacks. Hosted by Dr. Brett Walkenhorst, CTO, and Rahul Nagraj, Director of Engineering, this session provides you with essential updates on the latest advancements in Wireless Airspace Cybersecurity. This session includes a live demonstration of the latest Bastille’s Wireless Airspace Cybersecurity capabilities in action. What You’ll Learn Insights into evolving wireless vulnerabilities, including Evil Twin attacks, hotspot data exfiltration, and the Nearest Neighbour Attack. How Bastille’s patented technologies—Massive…
Wireless Airspace Cybersecurity
This solution brief highlights the growing risks of wireless threats to enterprises, emphasizing the need for continuous monitoring and comprehensive security measures to protect against unauthorized access, data breaches, and device vulnerabilities.
Wireless Security for Corrections Facilities
Contraband cell phones pose serious security risks in correctional facilities, enabling inmates to bypass monitoring systems, coordinate crimes, and maintain outside connections. Detecting and confiscating these devices is a critical challenge. Corrections Challenges For most of us, a cell phone is a lifeline to the worldsomething we can't do without. However, a cell phone is more than a convenient gadget in a corrections facility—it can be a dangerous weapon. Contraband cellular phones have long been a security and public safety…
Preventing Data Exfiltration from Data Centers
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats. WIDS - an introduction Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment…