Articles of interest from the week of March 29, 2021
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Jul 29, 2019 12:00:00 AM
Threat detection/response is a high priority, but many organizations don’t have the staff or skills to perform these tasks alone. This translates into a growing MDR market. (By John Oltsik, CSO)
More than 100 million customers have had their data compromised by a hacker after a cloud misconfiguration at Capital One. (By Jason Corcoran, Threatpost)
Tangipahoa Parish has become the latest victim in a series of cybersecurity attacks on Louisiana schools that prompted an emergency declaration and has officials scrambling to mitigate damage ahead of the school year starting next week. (By Emma Kennedy, The Advocate)
Many years ago, I left a job to take a new position. Several weeks after I made the move, I was searching for some information and realized that it may have been in my former email inbox. On a whim, I checked to see if I could still log in. Not only was able to access that inbox, but I discovered I still had access to everything on the network, including sensitive employee records and the financial database. I reported that I still had access, but on periodic checks, I stayed on the company’s active list for at least six months after I had left. Imagine what I could have done if I was vindictive! (By Sue Poremba, Security Boulevard)
A new ransomware family targeting Android devices spreads to other victims by sending text messages containing malicious links to the entire contact list found on already infected targets. (By Sergiu Gatlan, Bleeping Computer)
The 2018 Verizon Data Breach Investigations Report cited that 58% of cyber-attack victims were small businesses, and the 2019 Symantec Internet Threat Report stated that employees working at small businesses were more likely to be targeted by email threats (e.g., malware, spam, phishing) than those employed at larger companies. (By Josh Ladeau, Insurance Journal)
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
Lazarus Hackers Use Windows Update To Deploy Malware North Korean-backed hacking group Lazarus has added the Windows Update client to its list of...
Ransomware Attacks Rise 37% in Q3, Targeting IT Vendors, Their Clients: Beazley Ransomware attacks increased by 37% during the third quarter of 2019,...