Continuous TSCM

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series. Watch the webinar to learn more about securing your environment from unwanted and unauthorized radio emitting devices. In this webinar our CTO, Brett Walkenhorst, Ph.D., will discuss how to find: Rogue Wi-Fi access points and data ex-fil devices Rogue video and still-image cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial Control System jammers, blockers and…

Wireless Threat Intelligence for Your Cloud Infrastructure

Join our CTO, Brett Walkenhorst, Ph.D., and Aaron Gosney, Director of Field Engineering, to learn more about improving Wireless Threat Intelligence for your Cloud Infrastructure. Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Cloud Infrastructure security. In the webinar we cover Data Exfiltration techniques such as: Rogue Wi-Fi access points and data ex-fil devices Rogue cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge…

Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond… Part 2

The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities in cellular protocols. Our speakers, Dr. Altaf Shaik from the Technical University of Berlin and Bastille CTO Dr. Brett Walkenhorst review more modern forms of IMSI catchers, API vulnerabilities, and various forms of cell phone spyware. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate…

Bastille Technology Update

In this technology update webinar Dr. Brett Walkenhorst, CTO at Bastille, covers the latest features in Bastille's range of Wireless Threat Detection solutions for detecting, locating and responding to unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. What will you learn from the webinar? - Latest technical updates on Bastille - Recent RF threats…

Bastille Technology Update

In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille's range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced…

Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond… Part 1

The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities discovered in cellular protocols. Dr. Altaf Shaik from the Technical University of Berlin and Bastille, CTO Dr. Brett Walkenhorst review historical application layer, interconnect, and IMSI catchers. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate the impact of some of these threats. In this…

Continuous TSCM

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your environment from unwanted and unauthorized radio emitting devices. Watch the webinar to learn about the latest techniques in Continuous Technical Surveillance and Countermeasures. Three things you will learn from the Webinar: How to detect and locate wireless devices Key challenges facing TSCM professionals Latest TSCM features in Bastille Speaker: Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2022

PLUS DEF CON AND BLACK HAT UPDATES In this webinar Dr. Walkenhorst provides updates on the now infamous Pegasus Spyware affecting billions of cell phones. In addition he reviews the latest RF vulnerabilities presented at Black Hat and DEF CON, including: 4G/5G API Vulnerabilities New Attack Surfaces of BLE Mesh Wireless Keystroke Injection via BLE Low-Level Router Vulnerabilities PIPEDREAM Automotive Rollback Attack Speaker: Dr. Brett Walkenhorst has over 20 years of experience as a technology leader in RF systems and…

Wireless Intrusion Detection Location and Alerting

In this webinar with Carahsoft, Dr. Brett Walkenhorst, Bastille’s CTO provides an Executive Briefing on how detecting cell phones, Bluetooth wearables and RF gadgets becomes reality with Bastille. Bastille’s real-time Cellular, Bluetooth, BLE and Wi-Fi detection and location system locates all authorized and unauthorized devices within a campus or forward deployed location. Wireless Devices Located include: Cell Phones: Individual phones located in real-time just by their cellular signal Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human…

Get Rid of Your Shadow-IT and Radio Frequency (RF) Network Blindness

RF GEOFENCE BOUNDARY POLICY ENFORCEMENT WITH BASTILLE AND ARUBA Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure…