Articles of interest from the week of March 29, 2021
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Sep 2, 2019 12:00:00 AM
Eighty percent of companies surveyed experienced a cybersecurity incident in the past year, the most common being malware attacks, according to the Better Security And Business Outcomes With Security Performance Management Report by Forrester Consulting. (Security Magazine)
The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a hurricane-related subject line, attachment, or hyperlink. In addition, users should be wary of social media pleas, texts, or door-to-door solicitations relating to severe weather events. (By CISA, Department of Homeland Security)
Schools handle a lot of personal data and may not have strong technology teams, leaving them vulnerable to attacks, experts say. (By Brittany Greeson, The New York Times)
As the number vulnerabilities hit a historic high, battle-worn security teams are upping their patching game. (By Tom Spring, ThreatPost)
Got Fortigate or Pulse Secure? Now would be a good time to make sure they're patched. (By Dan Goodin, ArsTechnica)
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
CISA Statement on Iranian Cybersecurity Threats Christopher C. Krebs, Director of the Cybersecurity and Infrastructure Agency (CISA), issued an...
Top 7 Common Cybersecurity Myths — Busted Even with the growing awareness about cybersecurity, many myths about it are prevalent. These...