Bastille Technology Update

In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille's range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced…

Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond – Part 1

The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities discovered in cellular protocols. Dr. Altaf Shaik from the Technical University of Berlin and Bastille, CTO Dr. Brett Walkenhorst review historical application layer, interconnect, and IMSI catchers. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate the impact of some of these threats. In this…

Continuous TSCM

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your environment from unwanted and unauthorized radio emitting devices. Watch the webinar to learn about the latest techniques in Continuous Technical Surveillance and Countermeasures. Three things you will learn from the Webinar: How to detect and locate wireless devices Key challenges facing TSCM professionals Latest TSCM features in Bastille Speaker: Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2022

Plus Def Con and Black Hat Updates In this webinar Dr. Walkenhorst provides updates on the now infamous Pegasus Spyware affecting billions of cell phones. In addition he reviews the latest RF vulnerabilities presented at Black Hat and DEF CON, including: 4G/5G API Vulnerabilities New Attack Surfaces of BLE Mesh Wireless Keystroke Injection via BLE Low-Level Router Vulnerabilities PIPEDREAM Automotive Rollback Attack Speaker: Dr. Brett Walkenhorst has over 20 years of experience as a technology leader in RF systems and…

Wireless Intrusion Detection Location and Alerting

In this webinar with Carahsoft, Dr. Brett Walkenhorst, Bastille’s CTO provides an Executive Briefing on how detecting cell phones, Bluetooth wearables and RF gadgets becomes reality with Bastille. Bastille’s real-time Cellular, Bluetooth, BLE and Wi-Fi detection and location system locates all authorized and unauthorized devices within a campus or forward deployed location. Wireless Devices Located include: Cell Phones: Individual phones located in real-time just by their cellular signal Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human…

Get Rid of Your Shadow-IT and Radio Frequency (RF) Network Blindness

RF Geofence Boundary Policy Enforcement with Bastille and Aruba Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure…

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Data Center security. Learn about Data Exfiltration techniques such as: Rogue Wi-Fi access points and data ex-fil devices Rogue cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial Control System jammers, blockers…

Cell Phone Spyware and Vulnerabilities Update

Spyware and USB Cables Cell Phone Spyware and Vulnerabilities Update In this webinar Dr. Baxley will update you on the latest on the Pegasus Cell Phone Spyware, which affects billions of devices. Dr. Baxley will also review our own research into the variety of Cell Phone Spyware vendors and capabilities. Plus, he will review findings from our recent Cell Phone Spyware survey. While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is…

Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2021

Pegasus Spyware, Def Con and Black Hates Updates Cellphone Spyware and Vulnerabilities Update In this webinar Dr. Bob Baxley, CTO and head of the Bastille Threat Research Team explains how hackers use the Pegasus cellphone spyware and other vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Dr. Baxley will also review the latest RF vulnerabilities presented at Black Hat and DEF CON. While the news about Pegasus Spyware focused on the individuals…

Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities

Learn How to Use Bastille with CIS Mobile to Enable Employees to Safely Enter Secure Facilities with Cell Phones Bastille and CIS Integration Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not…