Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

Cyrus Robinson

Cybersecurity Blog
VMware vCenter Vulnerabilities

1 min read

VMware vCenter Vulnerabilities

VMWare refers to these two vulnerabilities collectively as VMSA-2021-0010. CVE-2021-21985 - The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is...

Read More
The Phishing Adventures of Huck Phinn, Chapter 5:  Reeling In the Damage

3 min read

The Phishing Adventures of Huck Phinn, Reeling In the Damage

Chapter 5 In the previous chapter, we left Huck with no idea he had given a phishing scammer access to his employee network credentials. But beneath...

Read More
The Phishing Adventures of Huck Phinn, Another Kettle of Phish

3 min read

The Phishing Adventures of Huck Phinn, Another Kettle of Phish

Chapter 4 Huck had narrowly eluded several phishing traps, and he now routinely screened his work Outlook email inbox for suspicious messages. He...

Read More
The Phishing Adventures of Huck Phinn, Chapter 3: Deep Water Spear Phishing

4 min read

The Phishing Adventures of Huck Phinn, Deep Water Spear Phishing

Chapter 3 In the previous chapter, Huck Phinn, who works for an environmental group, narrowly escaped a phishing email trap by recognizing red flags....

Read More
The Phishing Adventures of Huck Phinn, Dangling Bait in Open Waters

3 min read

The Phishing Adventures of Huck Phinn, Dangling Bait in Open Waters

Chapter 2 In Chapter One we mentioned that the most common phishing attacks are mass emails sent to as many recipients as possible in hopes that even...

Read More
The Phishing Adventures of Huck Phinn, Chapter 1: Plenty of Phish in the Sea

2 min read

The Phishing Adventures of Huck Phinn, Plenty of Phish in the Sea

Chapter 1 Chances are you know about the dangers of clicking on fake emails so you carefully scroll through your inbox to delete them. You are...

Read More
How To Respond When You’ve Been Breached

9 min read

How To Respond When You’ve Been Breached

An employee calls the helpdesk saying that they can’t access their files, and there’s a note on the screen saying to email the attacker to send...

Read More
 

Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Subscribe-to-NetSec-News-v4