Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of August 26, 2019

IRS Issues Warning on New Email Phishing Scam

A new email phishing scam involving false claims about electronically filed tax returns was reported Aug. 22 by the IRS. (By Michael Trimarchi, Bloomberg Tax)


CISA Insights - Ransomware Outbreak

Ransomware has rapidly emerged as the most visible cybersecurity risk playing out across our nation’s networks, locking up private sector organizations and government agencies alike. And that’s only what we’re seeing – many more infections are going unreported, ransoms are being paid, and the vicious ransomware cycle continues on. We strongly urge you to consider ransomware infections as destructive attacks, not an event where you can simply pay off the bad guys and regain control of your network (do you really trust a cybercriminal?). (By the Cybersecurity and Infrastructure Security Agency, Department of Homeland Security)

Employers Beware: Microsoft Word ‘Resume’ Phish Delivers Quasar RAT

A round of phishing emails purports to be from job seekers – but actually uses a slew of detection evasion tactics to download malware on victim systems. (By Lindsey O'Donnell, ThreatPost)


Pentesting as Part of an Organizational Security Program

Robust IT security programs are a must for any organizations that rely more and more on information system infrastructures to manage data, activities, business procedures and relations with clients. As so much is stored and processed through a company’s IT systems, no business, regardless of size and type of industry, is safe from attackers and malicious hackers.  (By Daniel Brecht, Infosec)

Microsoft Tops Phishers' Favorite Brands as Facebook Spikes

Cybercriminals often exploit victims' familiarity with popular brands to manipulate them into falling for phishing campaigns. Microsoft is the most common brand to spoof, researchers report, with PayPal in second place and Facebook rapidly catching up in a close third. (By Kelly Sheridan, DarkReading)

Sign Up For Network Security News

Articles of interest from the week of August 22, 2022

The Election Infrastructure-ISAC Wants To ‘Reintroduce’ Itself Four years into its existence, a cybersecurity and intelligence-sharing operation...

Read More

Articles of interest from the week of June 24, 2019

CISA Statement on Iranian Cybersecurity Threats Christopher C. Krebs, Director of the Cybersecurity and Infrastructure Agency (CISA), issued an...

Read More

Articles of interest from the week of February 24, 2020

Why Ransomware Attacks on Municipalities Spiked in 2019 Ransomware spread to a number of city, state and local governments across the U.S. in 2019....

Read More