Recap of Laird Webinar: Leveraging Security Features of Bluetooth for IoT Applications

Published on February 2, 2017

Archived Notice

This article has been archived and may contain broken links, photos and out-of-date information. If you have any questions, please Contact Us.

Recap of Laird Webinar: Leveraging Security Features of Bluetooth for IoT Applications

On January 31st Ezurio (formerly Laird Connectivity) Solutions hosted a live webinar and Q&A session. Titled, “Designing for Success: Leveraging Security Features of Bluetooth for Your IoT Applications”, the webinar featured commentary from wireless experts Jonathan Kaye and Jennifer Gibbs. The presenters walked through the evolution of security features in Bluetooth Low Energy (BLE) specifications from the initial release in version 4.0 to the recently announced Bluetooth 5 specification and covered the many critical security enhancements added to Bluetooth to protect against threats such as Man-in-the-Middle attacks (active eavesdropping), passive eavesdropping, and tracking.

Check out the full presentation to learn about how to leverage BLE’s security features for your next connected product design.