RSA Conference Greatest Hits: May 2016

We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. 

What were your favorite RSA Conference blog posts and videos in the month of May this year? 

Top Blog Posts

1. Executive Hotel Rooms Are a Hacker’s Treasure Chest: Woody Wooden takes a look at the ways in which malicious hackers can steal your data using simple devices planted in hotel rooms. A must-read for the business traveler. 

2. Network Intrusion: Methods of Attack: Robert Moskowitz's exploration of network attack vectors continues to be one of your favorite stories on our blog. 

3. How We Foiled Ransomware and Got the Files Back: Derek Soeder, a senior threat researcher at Cylance, discusses how he and his team reverse engineered ransomware to recover the password used to encrypt client files. 

Top Videos

1. The transition to the machine intelligence era is likely to have profound consequences for human society. Nick Bostrom will discuss some of the distinctive safety concerns that arise when we consider the possibility of superintelligent AI and some of the recent work that has been done to develop better models for thinking about these matters.

2. Nine years ago Scott Harrison started charity: water with a mission to bring clean drinking water to every person on the planet living without it. Learn from Scott's personal journey from New York City nightlife to building an organization that's funded over 9,000 water projects in 20 countries from his presentation at RSA Conference 2014. The remarkable success of charity: water shows us the power of community and technology when focused on a single, shared mission. 

3. Ever wondered what this black magic that hackers and security analysts use to reverse engineer apps? This session aims to quash the rumors that you need a Ph.D. in hacking to take apart a mobile app and learn its secrets. We'll show how to extract an Android application from the phone, and use common and simple utilities to inspect it. 

Posted on June 7, 2016

Jennifer Lawinski

by Jennifer Lawinski

Editor-In-Chief, RSA Conference

← View more Blogs

This document was retrieved from on Tue, 25 Oct 2016 08:01:42 -0400.
© 2016 EMC Corporation. All rights reserved.