This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Vulnerability Assessment and Penetration Testing for BLE devices

I had an interesting call with the IT security team of a large Fortune 100 company. During our conversation they asked a few questions and I was wondering if someone from Nordic Dev Support can help with the answers
1. Is BLE recommended for Industry 4.0 best practices? If yes, is it documented somewhere?
2. Is the Bluetooth Network Penetrable? 
3. Do we have a VAPT (Vulnerability Assessment and Penetration Testing) report from any Industry who has implemented BLE?
I would love it if someone is able to help me with this.
Parents Reply Children
No Data
Related