Resources Video

Bluetooth Summary

Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
Below, Find a Recap of CTO, Dr. Brett Walkenhorst’s Bluetooth Part 2 Webinar
Bluetooth is a complex spec. This short video provides a wrap up of what makes Bluetooth unique, incluing its architecture type, maturity level, and exploitation potential. Ultimately, Brett reminds us that historical threats are just as important as the emerging threats due to the lingering risk that they pose to present day security, and for their informative potential.

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.