Bastille Threat Research – Bluetooth Vulnerabilities

Bluetooth and Bluetooth Low Energy devices are all over the enterprise environment, yet few networks can adequately detect attacks that target or use these communications protocols. Learn about various Bluetooth vulnerabilities and attacks, and discover how you can defend against them with Bastille's Wireless Airspace Defense solution.

Bastille Technology Update

In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille's range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced…

Wireless Geofence Policy Enforcement

RF GEOFENCE BOUNDARY POLICY ENFORCEMENT WITH BASTILLE AND ARUBA FEATURING: EVIL TWIN ATTACK DETECTION DEMO Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can…

Bastille Research – Wireless Insider Threat

Organizations have security controls in place to detect and mitigate insider threats. However, these controls are not complete without a robust Wireless Airspace Defense solution to detect and locate insider threats using wireless devices for malicious purposes. Learn why protecting wireless airspace is so critical to combat insider threats.

Bastille Research – TSCM

Technical Surveillance Countermeasures (TSCM) seek to discover, pinpoint, and neutralize harmful surveillance devices to prevent a data breach. Learn how Bastille's Wireless Airspace Defense solution implements continuous TSCM to increase security, detect suspicious activity, and locate unauthorized devices.

Bastille Research – Bluetooth Vulnerabilities

Legacy wired and Wi-Fi security controls can't protect against wireless threats posed by Bluetooth Classic and Bluetooth Low Energy. Learn how Bluetooth vulnerabilities and attacks impact security, and what you can do about it.

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats. WIDS - an introduction Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment…

Electronic Device Detection Best Practices: Meeting the SECDEF Memo Deadline

The deadline is rapidly approaching to comply with the SECDEF's regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Key Topics: Understanding the SECDEF memo and its implications for CNSI security Best practices for detecting and managing personal and portable electronic devices within SCIFs and SAPFs Advanced strategies to mitigate the risks posed by electronic devices to classified information Compliance requirements and how to prepare…

Wireless Geofence Policy Enforcement Example

RF Geofence Boundary Policy Enforcement with Bastille and aruba Featuring: Evil Twin Attack Detection Demo Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can…