Emerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowEmerging Tech: Security — The Need for Wireless Airspace Defense
Download nowSafeguarding Classified National Security (CNSI) from the Threats Posed by Personal or Portable Electronic Devices Within SCIFs and SAPFs
Read moreVideos
Wireless threats visually explained and demonstrated.
Webinars
Live or recorded online presentations or workshops
Whitepapers
Authoritative reports on complex threats
Datasheets
Explore key features, specifications, and benefits
Blog
Collection of articles with security insights
Support
Access our world-class assistance
Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
Learn more about the Bluetooth Protocol from CTO, Dr. Brett Walkenhorst
The Bluetooth protocol is nuanced in its range of applications. First published in 1999, the Bluetooth protocol has continued to evolve over the years into the multiple variants we know today. The most notable distinction may be between Bluetooth Classic and Bluetooth Low Energy, both of which fall under the Bluetooth spec but have distinct characteristics. Bluetooth, operating in the 2.4 GHz ISM band, has a significant number of use cases. Watch the short video below to see a quick overview of the Bluetooth protocol from CTO, Dr. Brett Walkenhorst.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.