IoT devices are everywhere in the enterprise network, from smart thermostats to badge readers. However, very few security stacks can adequately secure IoT infrastructure, especially when the devices have vulnerabilities that can't be patched. Learn how Bastille solves the IoT conundrum with its Wireless Airspace Defense solution.
Archives: Resources
Bastille Threat Research – Bluetooth Vulnerabilities
Bluetooth and Bluetooth Low Energy devices are all over the enterprise environment, yet few networks can adequately detect attacks that target or use these communications protocols. Learn about various Bluetooth vulnerabilities and attacks, and discover how you can defend against them with Bastille's Wireless Airspace Defense solution.
Bastille Technology Update
In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille's range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced…
Wireless Geofence Policy Enforcement
RF GEOFENCE BOUNDARY POLICY ENFORCEMENT WITH BASTILLE AND ARUBA FEATURING: EVIL TWIN ATTACK DETECTION DEMO Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can…
Bastille Research – Wireless Insider Threat
Organizations have security controls in place to detect and mitigate insider threats. However, these controls are not complete without a robust Wireless Airspace Defense solution to detect and locate insider threats using wireless devices for malicious purposes. Learn why protecting wireless airspace is so critical to combat insider threats.
Bastille Research – TSCM
Technical Surveillance Countermeasures (TSCM) seek to discover, pinpoint, and neutralize harmful surveillance devices to prevent a data breach. Learn how Bastille's Wireless Airspace Defense solution implements continuous TSCM to increase security, detect suspicious activity, and locate unauthorized devices.
Bastille Research – Bluetooth Vulnerabilities
Legacy wired and Wi-Fi security controls can't protect against wireless threats posed by Bluetooth Classic and Bluetooth Low Energy. Learn how Bluetooth vulnerabilities and attacks impact security, and what you can do about it.
Securing Data Centers from Cellular, RF and Wireless Intrusion Threats
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats. WIDS - an introduction Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment…
Electronic Device Detection Best Practices: Meeting the SECDEF Memo Deadline
The deadline is rapidly approaching to comply with the SECDEF's regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Key Topics: Understanding the SECDEF memo and its implications for CNSI security Best practices for detecting and managing personal and portable electronic devices within SCIFs and SAPFs Advanced strategies to mitigate the risks posed by electronic devices to classified information Compliance requirements and how to prepare…
Wireless Geofence Policy Enforcement Example
RF Geofence Boundary Policy Enforcement with Bastille and aruba Featuring: Evil Twin Attack Detection Demo Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can…