Bastille for Red and Blue Teams

Learn How to Use the MITRE ATT&CK Framework to Identify and Locate New Advanced Persistent Threats for Data Exfiltration Red or Blue Team? We work with both Red and Blue teams to increase their knowledge of Advanced Persistent Threats and Vulnerabilities from Cellular, Bluetooth, Wi-Fi and IoT devices. Time and again we hear “If you want to hunt threats, you have to have data”, while networks provide lots of data about devices connected to them, there is far less data…

Zero Trust Security Posture

Protecting Organizations from Rogue Access Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access. Bastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of…

Bastille Tactical Solutions

Portable Kits for Cellular & RF Based Threat Detection and Location Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations using Bastille's tactical deployment kits. Bastille Tactical Solutions: Our portable tactical kit comes in specialized versions for government and commercial use. For deployment in a range of scenarios we offer kits capable of providing situational awareness in temporary locations from 5,000 square…

Cyber Threat Hunting – Wireless Device APTs

From Cellular, Bluetooth, BLE and IoT Devices Bastille’s threat detection capabilities allow full visibility into RF devices operating in or close to your environment. Bastille detects the persistent threats that other enterprise threat hunters cannot detect, sending data to your SIEM and existing enterprise infrastructure to give you all the information you need to identify and locate the threat.Use Case: Data Exfiltration - Mobile Devices Remaining Suspiciously Static and / or Transmitting Inside OR Outside your buildings. When a cellular…

Enhanced Threat Hunting to include Wireless APTs

From Cellular, Bluetooth, BLE, and IoT Devices Time and again we hear “If you want to hunt threats, you have to have data.” Advanced Persistent Threats and Vulnerabilities from near-network devices using Cellular, Bluetooth or one of the many IoT protocols are invisible to most enterprise threat hunters, as few have any solution to collect the data regarding these devices. Without the data for threat hunters to investigate, the devices and threats persist, making the threat invisible. Bastille’s threat detection…

Radio Frequency IoT Threats

Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines Radio Frequency IoT vulnerabilities which enable hackers to bypass your security, gain access to your systems, and exfiltrate data and voice information. Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine Radio Frequency IoT Threats to Security. Learn about the latest IoT threats to your security, which: Affect Billions of Devices Allow Hackers…

Recent Bluetooth and BLE Threats

Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines how hackers can use recently disclosed Bluetooth and Bluetooth Low Energy (BLE) vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine 8 Recent Bluetooth and BLE Device Attacks. Learn about recent Bluetooth and Bluetooth Low Energy Attacks,…

Covid-19 Workplace: How to Use Bastille for Contact Tracing & Covid-19’s Implications for RF Security

Dr. Bob Baxley, CTO, Bastille examines two aspects of how Covid-19 will impact the workplace. The RF complexity of our workplaces will change as workers return based on the devices they bring, and the devices that they may be asked to wear. Adversaries will attempt to use the confusion to defeat existing security systems and protocols. In large workplace environments and campuses, the assumption that an infected worker has interacted with all workers is likely wrong, and technology to assist…

Technology Update: Current Technologies to Enforce RF Device Security Policy

Until recently, device policy for secure buildings has effectively been “No Devices Allowed”. However, in some situation's exceptions are now being granted for personal medical devices, health monitors and some other operation associated devices. Questions are being asked about the ability to allow some devices in some areas, some of the time. Consequently, there is a need for stratified policy and sophisticated technology which can accurately distinguish between approved and unapproved electronic devices in secure areas. In this webinar you…

Bastille FlyAway Kit – Portable Cellular & RF Based Cellular Based Threat Detection and Location

Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations. Join Dr. Bob Baxley, CTO, Bastille for a discussion on how Bastille uses passive Software Defined Radio sensor arrays to provide situational awareness for temporary locations. In this webinar, Dr. Bob Baxley will demonstration customer use cases from Defense and Civilian Agencies including how they: Enforce Flexible ‘Cell Phone’ or device policy: Enforce…