MItiga MIC

Wireless Attacks and Data Exfiltration in Secure Environments: Mitiga Mic with Brett Walkenhorst

Hosted By Brian Contos

In this episode of Mitiga Mic, Field CISO Brian Contos sits down with Brett Walkenhorst, CTO of Bastille, to uncover how wireless threats are quietly exploited across secure environments, from data centers to executive boardrooms.

Brett explains how attackers use Evil Twin and Nearest Neighbor techniques, hidden Bluetooth channels, USB implants, and even rogue hotspots buried in server racks to exfiltrate data without detection. He shares real-world cases and offers insights into what most organizations are missing when it comes to wireless threat visibility.

Mitiga Mic brings you candid conversations with cybersecurity leaders, analysts, researchers, and engineers about the human side of security in today’s cloud-first world.