Bob Baxley

See the following -

Bastille Announces Commercial Availability Of Solution That Can Accurately Locate Cell Phones Indoors Using Only Cellular Signals

Press Release | Bastille | February 20, 2021

Bastille, the leader in enterprise threat detection through software-defined radio (SDR), today announced its new Bastille Enterprise Cellular Intrusion Detection for enterprises. "Bastille has been doing radio frequency (RF) and Cellular Intrusion Detection and research for the Government for years" said Chris Risley, CEO at Bastille. "Only in 2020 did Bastille finally receive FCC approval for its Civilian cellular sensor array. This allows Bastille for the first time to offer accurate Cellular Intrusion Detection to the Enterprise. Now corporations can have the RF security that the DoD and Intelligence Community rely on to protect the nation's secrets." Bastille provides corporations the ability to discover, locate, and mitigate radio borne threats to their assets, facilities and networks.

Read More »

What are the Latest IoT threats to Network Security

Event Details
Type: 
Seminar/Webinar
Date: 
July 23, 2020 - 1:00pm - 2:00pm

Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Bob Baxley will examine recently disclosed vulnerabilities in protocols used by IoT devices which hackers can use to bypass your security, gain access to your systems, and exfiltrate data and voice information.

Read More »

Bastille Networks Zero Trust Cybersecurity Practices

Event Details
Type: 
Seminar/Webinar
Date: 
March 18, 2021 - 2:00pm - 3:00pm

Learn how to include Cellular, Bluetooth, BLE and IoT devices into your Zero Trust policy. Use Cases and Techniques for Enhancing your Zero Trust practices with examples featuring Bastille and automated Network Access Control (NAC ) systems. Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.

Read More »