Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Videos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Reports
Downloadable research reports on wireless security threats.
Solution Briefs
Featured product benefits and use cases
Blog
Articles focused on wireless security insights
Research
Leading wireless research from security experts
Academy
Training and documentation
Podcast
Cybersecurity podcasts produced by Bastille
Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Watch the Video Below to Learn More About Bluetooth Key Generation from CTO Dr. Brett Walkenhorst
In this short video, CTO Dr. Brett Walkenhorst describes the key generation process that occurs during Bluetooth connections. He details the difference between legacy pairing and secure connections (SC) pairing, both of which have varying nuances and security implications. For more secure connections, it’s advisable to use the latter of the two options. Even though this may mean limiting the number of devices with which you are communicating, the benefits of SC pairing significantly outweight the risks of legacy pairing if security is paramount for your organization.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.