Emerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowSafeguarding Classified National Security (CNSI) from the Threats Posed by Personal or Portable Electronic Devices Within SCIFs and SAPFs
Read moreVideos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Blog
Collection of articles with security insights
Support
Access our world-class assistance
Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Find Out More About What You Can Do To Defend Against Bluetooth Monitoring Attacks
CTO, Dr. Brett Walkenhorst, talks on how increased Bluetooth inquiry and scan request packets can be a sign of questionable activity on behalf of an attacker. Defenders can identify and pinpoint such dangers by actively keeping an eye out for such activity, which gives them important information about the whereabouts and identity of attackers. While active monitoring has its advantages, certain security monitoring in Bluetooth networks may be passive and less readily deployable for defense.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.