Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of August 19, 2019

Are You Prepared to Defend Against Ransomware?

One of the most telling statistics from this year’s Verizon Data Breach Investigations Report (DBIR) is that Ransomware remains a serious threat to all industries and accounts for nearly a quarter of all malware based attacks.  Ransomware has become so widespread and commonplace that a normal attack garners neither the shock of security professionals nor the attention of the media.  (By Sarena O'Donnell, Ingalls Information Security)


Coordinated Ransomware Attack Hits 23 Texas Government Agencies

Researchers say that the targeted ransomware cyberattack on 23 Texas local and state entities represents a shift from “attacks of opportunity” to more targeted, malicious attacks. (By Lindsey O’Donnell, Threatpost)

How to Protect Your Business from Phishing Scams

According to a recent report, 90% of all data breaches can be traced back to phishing attacks. Despite how common they are, however, few businesses know how to effectively protect themselves from this damaging cybercrime. (By Sam Woodhams, CPO Magazine)


The Flaw in Vulnerability Management: It's Time to Get Real

Companies will never be 100% immune to cyberattacks. But by having a realistic view of the basics, starting with endpoint vulnerabilities, we can build for a safer future. (By Jim Sounders, Dark Reading)


What is Managed Detection and Response? Definition, Benefits, How to Choose a Vendor, and More

According to Gartner, managed detection and response (MDR) vendors provide services to companies and organizations that aim to improve the way they detect threats, respond to incidents, and monitor their IT assets continuously. (By Ellen Zhang, Digital Guardian)

Sign Up For Network Security News

Articles of interest from the week of June 3, 2019

Phishing attacks that bypass 2-factor authentication are now easier to execute Penetration testers and attackers have a new tool in their arsenal...

Read More

Articles of interest from the week of July 20, 2020

Hacking Attacks on Hospitals for Patient Data Increase During Coronavirus Pandemic More than 80% of medical practices have been the victims of...

Read More

Articles of interest from the week of March 29, 2021

Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...

Read More