Learn more about why Wireless Intrusion Detection Systems (WIDS) are important for your security.
Bastille team is proud to announce Bastille Enterprise, an integrated solution that delivers enterprise security through software defined radio.
Bastille discovers a new vulnerability, KeySniffer. This affects wireless keyboards enabling hackers to see all the keystroke we type.
Bastille announces the discovery of MouseJack, a security vulnerability that puts billions of PC’s and millions of networks at risk. Maybe even yours.
2015 has been a very exciting year for car hacking, from Chris Valasek and Charlie Millers “road show” - to seeing a jeep stripped to pieces at DEFCON.
Growth of IOT devices is producing large data quantities and natural focus for big data companies - Dan Virgillito, InfoSec Institute.
What is in your corporate airspace? Our research team was pretty excited about ProxyHam, that is, until it was mysteriously pulled from DefCon lineup.
Big Data. Cloud Computing. The Quantified Self. The Internet of Things. These are concepts that are fueling today’s IT ecosystem.
Searching for a cure for insomnia, I spent the weekend combing through the 162 page report released from RAND Corporation.
The marriage of computers, wireless, and medical devices come with challenges. Are devices really vulnerable or is this just a theatrical plot for TV drama?
This week OpenDNS released a report on the Internet of Things and Enterprise security. This blog summarizes the findings and my thoughts.
The smart city; a city digitally connected to its residents and operators provide an enhanced quality of life and cost savings but some risks.
A very elite club was just created by Chris Roberts, if his allegations of commandeering an airplane are true.
The connected world means that it is time brush up on your security lingo. IoT, M2M and ICS devices introduces an expansion of exploitable attack surfaces.
It’s been a great two days of information sessions and expo mingling at the 2015 RSA Conference (#RSAC) in San Francisco. IoT is hot.
The cost of embracing technology is accepting some risk via new IT services. The more services in use, the more vectors are created for bad guys to exploit.