Emerging Tech: Security — The Need for Wireless Airspace Defense
Download now▶Bastille Wins 2025 SC Award for Best Threat Detection Technology
Press ReleaseEmerging Tech: Security — The Need for Wireless Airspace Defense
Download now▶Emerging Tech: Security — The Need for Wireless Airspace Defense
Download now▶Safeguarding Classified National Security (CNSI) from the Threats Posed by Personal or Portable Electronic Devices Within SCIFs and SAPFs
Read more▶Videos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Blog
Collection of articles with security insights
Research
Research from our world-leading radio security experts
Academy
Learn everything there is to know about Bastille
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 2.”
Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases.
In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:
Keystroke Injection
Pairing Attacks
Paired Attacks
Implementation Flaws
PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols
Speaker:
Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.