Articles of interest from the week of September 30, 2019
Rethinking Responsibilities and Remedies in Social-Engineering Attacks The idea that humans are the weakest link shouldn’t guide the thinking on...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Aug 5, 2019 12:00:00 AM
The latest data from ransomware recovery vendor, Coveware, outlines the current state of the cost, duration, and recovery rate of ransomware attacks today. (By Stu Sjouwerman, KnowBe4)
We've started a running list, and the results are sobering. (By Shelby Brown, Cnet)
A charlatan who passed himself off as a Dell staffer working in equipment and services support has pleaded guilty to stealing nearly $750,000 from the University of California San Diego (UCSD) in a spear-phishing attack. (By Lisa Vaas, Naked Security)
It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility of the compromise, according to a new Zimperium report. (Help Net Security)
IT departments are failing to patch security holes in software because of a disconnect between security and operations teams, survey finds. (By Cliff Saran, ComputerWeekly) Editor’s Note: If you’d like to read more information about this topic, see our blog post on Advanced Control: Vulnerability Lifecycle Management.
If your password is easy to remember, chances are it may also be easy to hack. (By Jennifer Earl, Fox Business) Editor’s Note: If you’d like to read more information about this topic, see our blog post on Critical Control: Deploy Advanced User Account Protection
Rethinking Responsibilities and Remedies in Social-Engineering Attacks The idea that humans are the weakest link shouldn’t guide the thinking on...
How Attackers Sidestep the Cyber Kill Chain Many of the most popular cyberattacks don't follow all the steps of the cyber kill chain, but you have...
Ransomware Attacks Rise 37% in Q3, Targeting IT Vendors, Their Clients: Beazley Ransomware attacks increased by 37% during the third quarter of 2019,...