Archives: Resources

Bastille Threat Research – Bluetooth Vulnerabilities

Bluetooth and Bluetooth Low Energy devices are all over the enterprise environment, yet few networks can adequately detect attacks that target or use these communications protocols. Learn about various Bluetooth vulnerabilities and attacks, and discover how you can defend against them with Bastille’s Wireless Airspace Defense solution.

Bastille Technology Update

In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille’s range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices.

The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations.

In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced electronic device policies.

Dr. Baxley takes a deep dive into the Bastille GUI and the “clickology”. This includes how to find and isolate RF threats, and then use the DVR functionality to conduct analysis of how, when and where the offending device(s) first appeared in your facility, where else the device(s) have been and their activity levels.

What will you learn from the webinar?

  • Latest technical updates on Bastille
  • Recent RF threats seen by Bastille in the field
  • Update on Bastille Threat Signatures and Tag Policies
  • How to use Aruba, Splunk and Bastille to locate an “evil twin” device
  • How to track devices using the Bastille DVR
  • How our Massive Multi-Channel Demodulation technology can detect and decode all 79 Bluetooth channels
  • Bastille Ruggedized Outdoor Sensors
  • Integrations such as Aruba ClearPass, Cisco, and Lenel

Who should attend?

  • Security Professionals (Physical, Cyber, SIGINT, TSCM)
  • J2/6, G2/6, A2/6, N2/6
  • Network Operations Professionals
  • Intelligence, Surveillance and Reconnaissance, and Cyber Effects Operations
  • Command, Control, Communications and Computer Systems (C4)
  • Joint Staff Intelligence
  • Information Dominance, Intelligence, Network Operations, Cyberspace Operations
  • Speaker:

Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wireless Geofence Policy Enforcement

RF GEOFENCE BOUNDARY POLICY ENFORCEMENT WITH BASTILLE AND ARUBA

FEATURING: EVIL TWIN ATTACK DETECTION DEMO

Join our Brett Walkenhorst, Ph.D., and Aruba’s Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area.

With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure higher security.

Who Should Watch:

  • Heads of Security and Mobile Security
  • Physical Security Professionals

You Will Learn:

  • How to enable automated RF geofencing capabilities
  • How to detect RF violations within your facility or campus through geofencing
  • How to integrate Bastille with Aruba

Speakers:

Dr. Brett Walkenhorst, CTO at Bastille

Mathew George, Senior Technical Marketing Engineer at Aruba

Demos: During the Webinar see demos of integrations between Aruba and Bastille.

Bastille Research – Wireless Insider Threat

Organizations have security controls in place to detect and mitigate insider threats. However, these controls are not complete without a robust Wireless Airspace Defense solution to detect and locate insider threats using wireless devices for malicious purposes. Learn why protecting wireless airspace is so critical to combat insider threats.

Bastille Research – TSCM

Technical Surveillance Countermeasures (TSCM) seek to discover, pinpoint, and neutralize harmful surveillance devices to prevent a data breach. Learn how Bastille’s Wireless Airspace Defense solution implements continuous TSCM to increase security, detect suspicious activity, and locate unauthorized devices.

Bastille Research – Bluetooth Vulnerabilities

Legacy wired and Wi-Fi security controls can’t protect against wireless threats posed by Bluetooth Classic and Bluetooth Low Energy. Learn how Bluetooth vulnerabilities and attacks impact security, and what you can do about it.

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats.

WIDS – an introduction
Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment in security cameras, access control and other forms of perimeter security.

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen.

How can Bastille help?

Bastille can help you by displaying wireless devices as dots on a floor-plan map, accurately showing their location within a defined space. The system can also be configured to alert when a device is found where it shouldn’t be or suddenly moves to a restricted area, such as within a geo-fenced space – inside a data center. Better still, since all this is recorded, you can go back in time using our DVR function to see when and where a device first entered your secure data center.

WIRELESS DEVICES LOCATED INCLUDE:

Cell Phones: Individual phones located in real-time just by their cellular signal

Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear

Personal Medical Devices: e.g. Hearing aids

Laptops & Tablets

USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities

Any device emitting Cellular, Wi-Fi, Bluetooth or BLE

Top Data Center Use Cases include:

Enforce No Cell Phone Policy or Nuanced Wireless Device Policies

Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi

Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots

WIDS Compliance for Federal Customers’ Data

Integrations with existing infrastructure e.g. Lenel, Genetec, C•CURE, Splunk, Palo Alto, Aruba, Cisco, Juniper, MDM/UEMs (Mobile Iron, MaaS360, etc), Camera systems (Axis, Hikvision, etc)

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Electronic Device Detection Best Practices: Meeting the SECDEF Memo Deadline

The deadline is rapidly approaching to comply with the SECDEF’s regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs.

Key Topics:

Understanding the SECDEF memo and its implications for CNSI security

Best practices for detecting and managing personal and portable electronic devices within SCIFs and SAPFs

Advanced strategies to mitigate the risks posed by electronic devices to classified information

Compliance requirements and how to prepare your organization before the deadline

Whether you’re responsible for managing SCIFs, SAPFs, or safeguarding CNSI, this webinar will provide you with actionable insights.

Speakers:

Dr. Brett Walkenhorst, CTO at Bastille

Wireless Geofence Policy Enforcement Example

RF Geofence Boundary Policy Enforcement with Bastille and aruba

Featuring: Evil Twin Attack Detection Demo

Join our Brett Walkenhorst, Ph.D., and Aruba’s Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area.

With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure higher security.

Who Should Watch
  • Heads of Security and Mobile Security
  • Physical Security Professionals
You Will Learn
  • How to enable automated RF geofencing capabilities
  • How to detect RF violations within your facility or campus through geofencing
  • How to integrate Bastille with Aruba

Webinar: The SECDEF Compliance Deadline + Wireless Insider Threat

Are you equipped to address the SECDEF Compliance deadline of September 30, 2024? Watch this webinar to find out.

Brett Walkenhorst, CTO, Bastille

In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, cover the overlap of wireless insider threat and wireless threat intelligence in the context of the SECDEF Memo of June 30, 2023. This memo details compliance guidelines related to the use of personal wireless devices in SCIFs/SAPFs with a compliance deadline of September 30, 2024.

The speakers will cover the top 10 most pressing wireless insider threats in addition to providing apt mitigation strategies. With the approaching compliance deadline, awareness around both insider threat and wireless security is crucial to ensuring your facility’s security meets these new and evolving compliance standards.

Speakers:

Shawnee Delaney, Founder & CEO at Vaillance Group

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech