Video Hub
Video

Bluetooth Summary

Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
Below, Find a Recap of CTO, Dr. Brett Walkenhorst’s Bluetooth Part 2 Webinar
Bluetooth is a complex spec. This short video provides a wrap up of what makes Bluetooth unique, incluing its architecture type, maturity level, and exploitation potential. Ultimately, Brett reminds us that historical threats are just as important as the emerging threats due to the lingering risk that they pose to present day security, and for their informative potential.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.