Personal Information
Organização/Local de trabalho
Greater Atlanta Area United States
Cargo
Principal Researcher
Setor
Technology / Software / Internet
Sobre
Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition. His writing has appeared in Dark Reading and he has been quoted in publications such as Wired. He has more than a decade of security experience and once worked as a Software Engineer at Hewlett-Packard’s Application Security Center. Rob was also with SPI Dynam
Marcadores
security
penetration testing
cyber security
information security
application security
infosec
phishing
information gathering
blackhat
google hacking
google
web
red team
physical security
risk
social engineering
cloud
search engine
hacking
vulnerability
black hat
bing
adversary
counterpoint
debate
devsecops
breach
aws
dns
drone
rfid
osint
technical controls
cyber
email
compromise
defense
policies
enterprisesecurity
socialengineering
impersonation
interop
threat
bishopfox
mitigation
incidentresponse
vishing
opsec
operational security
bsides
pittsburgh
threats
cryptography
botnet
python
automation
bitcoin
anti-automation
cloud computing
defcon20
defcon
attack chaining
apt
pentest
pentesting
exploit
advanced exploit
vulnerability assessment
intelligence gathering
intelligence
web application security
black hat 2011
data loss
data loss prevention
malware
microsoft
passive analysis
filter
evasion
staticanalysis
information
Ver mais
Apresentações
(14)Gostaram
(3)Better watch your apps - MJ Keith
m j
•
Há 13 anos
Threat modeling librarian freedom conference
evacide
•
Há 8 anos
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Rob Ragan
•
Há 8 anos
Personal Information
Organização/Local de trabalho
Greater Atlanta Area United States
Cargo
Principal Researcher
Setor
Technology / Software / Internet
Sobre
Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition. His writing has appeared in Dark Reading and he has been quoted in publications such as Wired. He has more than a decade of security experience and once worked as a Software Engineer at Hewlett-Packard’s Application Security Center. Rob was also with SPI Dynam
Marcadores
security
penetration testing
cyber security
information security
application security
infosec
phishing
information gathering
blackhat
google hacking
google
web
red team
physical security
risk
social engineering
cloud
search engine
hacking
vulnerability
black hat
bing
adversary
counterpoint
debate
devsecops
breach
aws
dns
drone
rfid
osint
technical controls
cyber
email
compromise
defense
policies
enterprisesecurity
socialengineering
impersonation
interop
threat
bishopfox
mitigation
incidentresponse
vishing
opsec
operational security
bsides
pittsburgh
threats
cryptography
botnet
python
automation
bitcoin
anti-automation
cloud computing
defcon20
defcon
attack chaining
apt
pentest
pentesting
exploit
advanced exploit
vulnerability assessment
intelligence gathering
intelligence
web application security
black hat 2011
data loss
data loss prevention
malware
microsoft
passive analysis
filter
evasion
staticanalysis
information
Ver mais