Legacy wired and Wi-Fi security controls can't protect against wireless threats posed by Bluetooth Classic and Bluetooth Low Energy. Learn how Bluetooth vulnerabilities and attacks impact security, and what you can do about it.
Archives: Resources
Securing Data Centers from Cellular, RF and Wireless Intrusion Threats
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats. WIDS - an Introduction Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment…
Electronic Device Detection Best Practices: Meeting the SECDEF Memo Deadline
The deadline is rapidly approaching to comply with the SECDEF's regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Whether you're responsible for managing SCIFs, SAPFs, or safeguarding CNSI, this webinar will provide you with actionable insights. Key Topics: Understanding the SECDEF memo and its implications for CNSI security Best practices for detecting and managing personal and portable electronic devices within SCIFs and SAPFs Advanced…
Wireless Geofence Policy Enforcement Example
RF Geofence Boundary Policy Enforcement with Bastille and Aruba Featuring: Evil Twin Attack Detection Demo Join Bastille's Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can…
Webinar: The SECDEF Compliance Deadline + Wireless Insider Threat
Are you equipped to address the SECDEF Compliance deadline of September 30, 2024? Watch this webinar to find out. In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, cover the overlap of wireless insider threat and wireless threat intelligence in the context of the SECDEF Memo of June 30, 2023. This memo details compliance guidelines related to the use of personal wireless devices in SCIFs/SAPFs with a compliance deadline of September 30, 2024. The…
Webinar: Wireless Insider Threat + The SECDEF Memo – Hosted by SIGNAL Media
The deadline is rapidly approaching to comply with the SECDEF's regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Are you equipped to address these security concerns within your facility by September 30, 2024? Watch this webinar to find out. In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed light on the vulnerabilities that insiders exploit, whether…
Webinar: SECDEF Memo – Impacts on SCIF/SAPF Security
Following the Texiera leaks in 2023, the SECDEF issued a memo related to wireless device usage in SCIFs/SAPFs. The memo outlined new compliance deadlines to be met in line with the increased requirements for SCIF/SAPF security. Bastille partnered with RackTop Systems to dive into the memo, its implications, and examples of this type of security situation playing out in real life. In the webinar, Jeremy and Brett dive into the implications of the SECDEF Memo of June 30, 2023, in…
Webinar: Introduction to Wireless Threat Intelligence
In today’s ever-connected world, enterprise network connections are rarely, if ever, simple. With the significant presence of personal and portable devices in enterprise spaces, your network’s potential attack surface grows exponential. To address the risk introduced by unknown devices entering your organization, you need continuous visibility into all wireless activity within your space. This is where Wireless Threat Intelligence comes into play. Wireless Threat Intelligence provides this necessary wireless visibility to organizations. This not only allows for insight into wireless…
Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases. What you'll learn about threat categories as they relate to Bluetooth: Keystroke Injection Pairing Attacks Paired Attacks Implementation Flaws PLUS a showcase of some the new features in the latest version…
Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 1
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series Watch this webinar to learn more about the Bluetooth protocol and related vulnerabilities. As more and more devices use Bluetooth and BLE, the opportunity to find potential exploitations also increases. What you'll learn about threat categories as they relate to Bluetooth: Monitoring DoS Attacks Session Hijacking MitM Attacks PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other…