Security for the Internet of Radios

Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, wireless dongles and other IoT communications) in your organization’s airspace.

Bastille’s technology scans the entire radio spectrum, identifying devices on frequencies from 60 MHz to 6 GHz. This data is then gathered and stored, and mapped so that you can understand what devices are transmitting data, and from where in your corporate airspace. This provides improved situational awareness of potential cyber threats and post-event forensic analysis.

Read the AITE Group Report  by Senior Analyst, Danielle Tierney on Cell phone regulation and compliance in Financial Markets.  Watch the Webinar .

Read the AITE Group Report by Senior Analyst, Danielle Tierney on Cell phone regulation and compliance in Financial Markets. Watch the Webinar.


Who is using Bastille?


It's Time to Take the Blinders Off

Threats are becoming more complex as criminals look for new ways to use technology in their quest for valuable data. As the number of connected devices grows to more than 20 billion by 2020, the Internet of Things (IoT) will provide an unprecedented expansion of new threat vectors and Enterprises need to be able to respond. And what do 15 billion (75%) of these new devices have in common? … Radios! Much like the radios in other Wi-Fi and cellular devices. Bastille is providing solutions to allow Enterprise companies to Secure the Internet of Radios.

Now someone has finally taken a look and found that virtually all of (these devices) are vulnerable. That’s pretty scary.
— Samy Kamkar in Wired Magazine


This Radio Hacker could Hijack Citywide Emergency Sirens to play any sound.  



Bastille in the Wall Street Journal.jpg

"Cyberattack in Dallas Sets Sirens Blaring by Radio Signal, Authorities say" Wall Street Journal asks Bastille about the threats of hackers using radios rather than conventional computer intrusion techniques


"You May Have Helped Crash the Internet. But How Would You Know?" Xconomy asks Bastille about the recent DNS DDoS BOTNET attack.


MouseJack Vulnerability.jpg



When you think of RF vulnerabilities, you probably think first of Bluetooth and Wi-Fi issues. There have been well-publicized vulnerabilities in both during the past year, but the issue is broader. RF devices also include RFID tags, NFC (e.g., Apple Pay), 433 MHz remote control, LR-WPAN networking, and a host of proprietary protocols. Any of them can have security issues.

Read more