RSA Conference Greatest Hits: May 2016

Posted on by Jennifer Lawinski

We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. 

What were your favorite RSA Conference blog posts and videos in the month of May this year? 

Top Blog Posts

1. Executive Hotel Rooms Are a Hacker’s Treasure Chest: Woody Wooden takes a look at the ways in which malicious hackers can steal your data using simple devices planted in hotel rooms. A must-read for the business traveler. 

2. Network Intrusion: Methods of Attack: Robert Moskowitz's exploration of network attack vectors continues to be one of your favorite stories on our blog. 

3. How We Foiled Ransomware and Got the Files Back: Derek Soeder, a senior threat researcher at Cylance, discusses how he and his team reverse engineered ransomware to recover the password used to encrypt client files. 

Top Videos

1. The transition to the machine intelligence era is likely to have profound consequences for human society. Nick Bostrom will discuss some of the distinctive safety concerns that arise when we consider the possibility of superintelligent AI and some of the recent work that has been done to develop better models for thinking about these matters.

2. Nine years ago Scott Harrison started charity: water with a mission to bring clean drinking water to every person on the planet living without it. Learn from Scott's personal journey from New York City nightlife to building an organization that's funded over 9,000 water projects in 20 countries from his presentation at RSA Conference 2014. The remarkable success of charity: water shows us the power of community and technology when focused on a single, shared mission. 

3. Ever wondered what this black magic that hackers and security analysts use to reverse engineer apps? This session aims to quash the rumors that you need a Ph.D. in hacking to take apart a mobile app and learn its secrets. We'll show how to extract an Android application from the phone, and use common and simple utilities to inspect it. 

Jennifer Lawinski

Director of Social Media & Community, Arculus

artificial intelligence & machine learning mobile security ransomware

Blogs posted to the website are intended for educational purposes only and do not replace independent professional judgment.  Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA® Conference, RSA Security LLC or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community