Recent Bluetooth and BLE Threats

Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines how hackers can use recently disclosed Bluetooth and Bluetooth Low Energy (BLE) vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine 8 Recent Bluetooth and BLE Device Attacks. Presenter: Dr. Baxley is CTO, Bastille and former Director…

Covid-19 Workplace: How to Use Bastille for Contact Tracing & Covid-19’s Implications for RF Security

Dr. Bob Baxley, CTO, Bastille examines two aspects of how Covid-19 will impact the workplace. The RF complexity of our workplaces will change as workers return based on the devices they bring, and the devices that they may be asked to wear. Adversaries will attempt to use the confusion to defeat existing security systems and protocols. In large workplace environments and campuses, the assumption that an infected worker has interacted with all workers is likely wrong, and technology to assist…

Technology Update: Current Technologies to Enforce RF Device Security Policy

Until recently, device policy for secure buildings has effectively been “No Devices Allowed”. However, in some situations exceptions are now being granted for personal medical devices, health monitors and some other operation associated devices. Questions are being asked about the ability to allow some devices in some areas, some of the time. Consequently, there is a need for stratified policy and sophisticated technology which can accurately distinguish between approved and unapproved electronic devices in secure areas. Presenter: Dr. Baxley is…

Bastille FlyAway Kit – Portable Cellular & RF Based Cellular Based Threat Detection and Location

Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations. Join Dr. Bob Baxley, CTO, Bastille for a discussion on how Bastille uses passive Software Defined Radio sensor arrays to provide situational awareness for temporary locations. In this webinar, Dr. Bob Baxley will demonstration customer use cases from Defense and Civilian Agencies including how they: Enforce Flexible ‘Cell Phone’ or device policy: Enforce…

OODA Executive Briefing on finding phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection

TOPIC No doubt about it, there are devices violating your policy inside your facility as we speak. At least, there are if you are not checking for them. This could include the inadvertent violation of policy by an employee who accidentally left a smart phone in a bag or wore a paired smart device to work by mistake. Or it could be an intentional attempt to eavesdrop on conversations and record them using a device in the facility, or to…

Enforcing Device Policy with 24/7 Detection, Location, and Alerting

It’s a wireless world. Every agency has a Radio Frequency (RF) device policy. But policies without effective enforcement don’t work. In order to accomplish the mission, legitimate employees are carrying devices such as cell phones, wearables, smart watches, wireless cameras, tablets, hearing aids with BT or Bluetooth Low Energy (BLE) and Headsets. Old “no devices anywhere” policies have stopped working. Security officers need to be able to exclude all wireless and cellular devices from some indoor spaces and allow authorized…

Cellular Intrusion Detection – Executive Briefing

Dr. Bob Baxley and Jim Wressell will introduce the key capabilities and requirements for a complete Cellular Intrusion Detection system. In this webinar you will learn: Key Requirements for a Cellular Intrusion Detection system When to Use Cellular Intrusion Detection: Use Cases from the Field How 4th Generation Cellular Intrusion Detection systems differ from earlier solutions PLUS See a Live Demo of the Bastille system detecting Cell phones and integrated with Aruba, PagerDuty, Splunk and Security Cameras

Managing BYOD Risk

Bring your own device (or BYOD) may be standard policy at your organization. But it is also a serious and unmanaged risk to the security of your corporate network, sensitive data and intellectual property. Join Bastille Networks and Security Ledger to learn how undetected cellular devices including smart phones can provide access to your sensitive IT assets and how forward looking firms are tapping new tools to identify, track and manage cellular and wireless devices in their environment. In this…

Best Practices for Cell Phone Compliance and Security in Capital Markets

Danielle Tierney, leading analyst at AITE Group financial will cover: How regulations affect your compliance policy for cell phones Best practices for staying ahead of the regulations Security threats to your organization from unmonitored use of cellular devices Discussion includes several high-profile cases that involved the use of cell phones in the workplace resulting in serious financial and reputation damage. PLUS when you register the webinar you will receive access to Danielle's latest report "Cellular Surveillance: A Vital Compliance and…