Bluestone Analytics’ Director of Client Engagement, Lisa Banton, discusses the challenges of recruiting and hiring minorities in tech with Charlottesville Tomorrow reporter Billy Jean Louis. Lisa talks about how Bluestone Analytics has been able to successfully recruit a staff of 45% women in an industry with incredibly low gender diversity and about how she hopes Bluestone Analytics can broaden our success with recruiting women to continue to diversify our workforce.
What is DevSecOps? For the past several years, DevOps has been the go-to method for fast software development lifecycles. But just like testing is an integral part of app development, security is an integral part as well. Our CTO, Joe DePlato, discusses the importance of security throughout the software lifecycle during an interview with Greg Mooney for the Defrag This podcast.
We are honored to be a finalist for the 2019 Charlottesville Business Innovation Council (CBIC) Startup of the Year Award! The entire Bluestone Analytics team has worked tirelessly to give our clients the best cybersecurity solutions and help defend their data against advanced cyber threats, and we are thrilled to be recognized for these efforts. Winners will be announced at the 2019 CBIC Awards Gala on May 23.
Cybercriminals are always looking to access sensitive information with minimal effort. Jordan Shakhsheer, an Information Security Engineer at Bluestone Analytics, wrote an article for Dark Reading that delves into how easy it is for attackers to create a phishing campaign, and why user education is critical for preventing these types of attacks.
Ever wonder if your smart devices are spying on you? Our CTO + Co-founder, Joseph DePlato, was interviewed by Amy Lacey of Virginia Currents about how smart devices track your online behavior. He discusses digital assistants, location tracking, eerily specific targeted ads, and ways to reduce the information you share with advertisers.
Bluestone Analytics' CTO and Co-founder, Joseph DePlato, was featured as an external contributor in Horangi's 2018 Orange Report. He describes the confusion around managed security (MDR, MSSP, MSP) and why this is a disservice to businesses looking to protect their data. He also suggests simple ways that executives and IT teams can reframe their Information Security strategy to simplify and improve their cybersecurity efforts.
Large businesses have beefed up their security in recent years. As a result, hackers increasingly are preying upon smaller companies that may not have robust cyber defenses. How vulnerable are Virginia businesses to cyberattack risks? To get answers, Virginia Business hosted a cybersecurity roundtable with a panel of seven Virginia experts from a wide range of industries, including Bluestone Analytic's CTO, Joseph DePlato.
There isn’t a foolproof way for consumers to protect themselves against identity theft and data breaches, but there are precautions they can take. Efforts to safeguard personal information are increasingly important as data breaches become more common. Bluestone Analytics' CTO + Co-founder, Joseph DePlato, was consulted as a cybersecurity expert for this article.
Looking for something illicit? Chances are you’ll find what you’re looking for on the dark web — the black market of the internet where anonymous vendors sell drugs and weapons, arrange assassinations, engage in human trafficking and conduct other activities that frustrate law enforcement to no end. Bluestone Analytics' CEO + Co-founder, Liam Bowers, was selected to discuss cyber threats on the Dark Web, such as hackers for hire and the buying and selling of stolen data, at the US Capitol preceding a Virginia Tech Dark Web conference.
Last summer’s NotPetya ransomware attack should have been a wake-up call for the pharmaceutical industry. It infected organizations worldwide, including Merck. Employees at that pharmaceutical giant found manufacturing, research, sales, packaging, and formulations operations were locked. Even one month after the June 21 attack, some company operations were still recovering.
We are committed to helping the public understand the importance of Information Security, and we welcome the opportunity to work with journalists to get the information they need. All press inquiries should be directed to email@example.com.