Blog
Learn more about why Wireless Intrusion Detection Systems (WIDS) are important for your security.
As the number of medical devices explode, protection against RF risk in the clinical setting gets more complicated.
Monitoring Cellular and IoT Devices in Capital Markets, what you need to know and what is going on today
Bastille's Balint Seeber looks at the Dallas Siren incident to examine how public safety networks work and how they might be vulnerable to future RF attacks.
Bastille team is proud to announce Bastille Enterprise, an integrated solution that delivers enterprise security through software defined radio.
Bastille discovers a new vulnerability, KeySniffer. This affects wireless keyboards enabling hackers to see all the keystroke we type.
Bastille announces the discovery of MouseJack, a security vulnerability that puts billions of PC’s and millions of networks at risk. Maybe even yours.
2015 has been a very exciting year for car hacking, from Chris Valasek and Charlie Millers “road show” - to seeing a jeep stripped to pieces at DEFCON.
Growth of IOT devices is producing large data quantities and natural focus for big data companies - Dan Virgillito, InfoSec Institute.
What is in your corporate airspace? Our research team was pretty excited about ProxyHam, that is, until it was mysteriously pulled from DefCon lineup.
Big Data. Cloud Computing. The Quantified Self. The Internet of Things. These are concepts that are fueling today’s IT ecosystem.
Searching for a cure for insomnia, I spent the weekend combing through the 162 page report released from RAND Corporation.
The marriage of computers, wireless, and medical devices come with challenges. Are devices really vulnerable or is this just a theatrical plot for TV drama?
This week OpenDNS released a report on the Internet of Things and Enterprise security. This blog summarizes the findings and my thoughts.
The smart city; a city digitally connected to its residents and operators provide an enhanced quality of life and cost savings but some risks.
A very elite club was just created by Chris Roberts, if his allegations of commandeering an airplane are true.
The connected world means that it is time brush up on your security lingo. IoT, M2M and ICS devices introduces an expansion of exploitable attack surfaces.
It’s been a great two days of information sessions and expo mingling at the 2015 RSA Conference (#RSAC) in San Francisco. IoT is hot.
The cost of embracing technology is accepting some risk via new IT services. The more services in use, the more vectors are created for bad guys to exploit.
Over the weekend, I combed through the FTC’s recent report – all 71 pages on IOT. Surely there would be some nuggets of substantive information?
The Internet of Things has gained historic momentum and exposure since the last quarter of 2014. No longer are there differing opinions around viability.
Consumers don’t read privacy policies. A recent PEW Research survey showed that more than half of Americans don’t even know what a privacy policy really is.
Ready or not, the Internet of Things is coming. In this blog, I decided to explore just that – what’s ready and what’s not when it comes to IoT.
According to Google, nearly 60% of Android users will be left in the lurch when it comes to safety on their Android devices.
This year’s Consumer Electronics Show (CES), surely didn’t disappoint. Quite honestly, CES was all about the Internet of Things.
This week we saw two new platforms for the Internet of Things emerge, the most notable from Intel. Of course, this is just this week.
On October 20th, four ranking members on the Senate Commerce Committee, wrote a letter to Chairman Jay Rockefeller hearing before the end of 2014.
It happened. Black Friday and Cyber Monday came and went. One of the hottest items flying off the shelf was wearable technology.
In the first part of this series, we discussed how many IoT devices are selling out their users to the highest bidder.