News

  |  Tags: events

RSA 2017: Looking back

A week ago, our team returned from California where they had been taking part in one of the biggest security conferences in the world: RSA 2017.  Not only does the event give us a chance to meet new people but also to catch up with Silobreaker users from all over the world. With so many of our friends, partners and clients in attendance, RSA is just about the first week to be blocked off the calendar each year. 

Heading into RSA.

Heading into RSA: People. people and more people.

Every year, over the course of a week, 40,000 people descend on the Moscone Center in San Fransisco for the RSA conference. The event ‘where the world talks security’ plays host to 500 exhibitors from the information and cyber security sector. As one of them, we had an opportunity to introduce thousands of people to Silobreaker’s cyber threat intelligence capabilities over the three day exhibition period. 

We conducted live product demonstrations at our booth.

We held live product demonstrations at our booth throughout RSA.

With so much going on, RSA presented our team with a gruelling schedule. Despite this, they still found time to enjoy the Bay Area. 

San Fransisco

Golden Gate Bridge

Massive thanks to everyone we met, hopefully you enjoyed RSA as much as we did.

See you next year! 

The Silobreaker Team

The team at RSA 2017

Team Silobreaker at our booth before the rush. From left to right: George, Rob, Max and Darrell.

 

 

 

More News

  • Silobreaker Daily Cyber Digest – 21 September 2017

    Malware CryptoMix ransomware variant appends .shark extension to encrypted files > The SHARK variant uses one of three domains for victim contact payment information....
  • Silobreaker Daily Cyber Digest – 20 September 2017

    Malware aIR-Jumper Malware uses security cameras with infrared capabilities to steal data > aIR-Jumper takes collected data, breaking it down into binary and leveraging...
  • Silobreaker Daily Cyber Digest – 19 September 2017

    Malware New Locky ransomware variant switches to .ykcol extension > Stormshield reports that the variant is distributed via spam emails containing a VBS file...
View all News

Request a demo

Get in touch