In this episode of Mitiga Mic, Field CISO Brian Contos sits down with Brett Walkenhorst, CTO of Bastille, to uncover how wireless threats are quietly exploited across secure environments, from data centers to executive boardrooms.
Brett explains how attackers use Evil Twin and Nearest Neighbor techniques, hidden Bluetooth channels, USB implants, and even rogue hotspots buried in server racks to exfiltrate data without detection. He shares real-world cases and offers insights into what most organizations are missing when it comes to wireless threat visibility.
Mitiga Mic brings you candid conversations with cybersecurity leaders, analysts, researchers, and engineers about the human side of security in today’s cloud-first world.