GigaOm Radar for Attack Surface Management: Bishop Fox Named "Leader" and "Fast Mover". Read the report to learn why

Meet the Author

Rob Ragan Principal Researcher

Rob Ragan is a Principal Researcher at Bishop Fox. Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition. His writing has appeared in Dark Reading and he has been quoted in publications such as Wired.

Rob has more than a decade of security experience and once worked as a Software Engineer at Hewlett-Packard's Application Security Center. Rob was also with SPI Dynamics where he was a software engineer on the dynamic analysis engine for WebInspect and the static analysis engine for DevInspect.

Rob holds a Bachelor of Science from Pennsylvania State University with a major in Information Sciences and Technology and a focus on System Development.

Articles Written:

Past Speaking Engagements:

Subject Matter Expertise:

  • Red Teaming
  • Threat Modeling
  • Web App
  • IoT
  • Social Engineering
  • Startups/small business security
  • High-level topical breaches
  • Incidence Response
  • CloudBots
  • Attack Chaining
  • Botnets
Rob Ragan

Resources from Rob Ragan

SmogCloud video thumbnail with overlay play button.
Video

SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns

Cover slide deck expose yourself without insecurity blackhat arsenal 2020
Slide Deck

SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns

Efficacy of micro segmentation illumio Video Thumbnail
Video

Illumio Assessment Report: Interview with Raghu Nandakumara and Rob Ragan

Cover slide ghost in the browser broad-scale espionage with bitsquatting oscar salazar rob ragan of bishop fox
Slide Deck

Ghost In The Browser - Broad-Scale Espionage With Bitsquatting

Cover slide Ferris Bueller singing into microphone
Slide Deck

Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations

Pose a Threat: How Perceptual Analysis Helps Bug Hunters
Slide Deck

Pose a Threat: How Perceptual Analysis Helps Bug Hunters

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.