Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of June 3, 2019

Phishing attacks that bypass 2-factor authentication are now easier to execute

Penetration testers and attackers have a new tool in their arsenal that can be used to automate phishing attacks in a way that defeats two-factor authentication (2FA) and is not easy to detect and block. The tool makes such attacks much easier to deploy, so organizations should adapt their anti-phishing training accordingly. (By Lucian Constantin, CSO)


Cybersecurity: You're Probably Over-Confident About Your Defenses or Under-Prepared for a Breach

A survey by cybersecurity company Palo Alto Networks and British pollster YouGov found that 68 percent of people believe they're doing all they can to protect themselves against cyberattacks. The Trust in a Digital Replace report set out to examine the attitudes of the general public when it came to cybersecurity, privacy and technology in the modern world. (By Danny Palmer, ZDNet)


Hollywood Lie: Bank Hacks Take Months, Not Seconds

A report published today by cyber-security firm Bitdefender gives one of the best views we ever got into the inner-workings of a modern bank heist, and more particularly, a bank heist carried out by Carbanak, a group of hackers responsible for stealing more than one billion euros from banks all over the world. (By Catalin Cimpanu, ZDNet)


Shade Ransomware Expands to U.S. Targets

Shade, a ransomware known to target Russian victims, has been spotted in several recent campaigns scoping out new locations – including in the U.S. and Japan. (By Lindsey O'Donnell, Threatpost)


Employees are Almost as Dangerous to Business Security as Hackers and Cybercriminals

Non-malicious insiders are among the top three threat actors, according to an ISACA report. (By Alison DeNisco Rayome, TechRepublic)


A New Approach for Combating Insider Threats

An insider threat can encompass anything from a gullible employee falling for a spearphishing email, to unaware new hires sharing data inappropriately – all the way to a rogue employee stealing company data. (By Lindsey O'Donnell, Threatpost

Sign Up For Network Security News